Jean-Noël Colin

ORCID: 0000-0003-4754-7671
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Access Control and Trust
  • Cryptography and Data Security
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Digital Rights Management and Security
  • Privacy-Preserving Technologies in Data
  • Distributed and Parallel Computing Systems
  • Peer-to-Peer Network Technologies
  • Privacy, Security, and Data Protection
  • Cloud Data Security Solutions
  • Internet Traffic Analysis and Secure E-voting
  • Security and Verification in Computing
  • Open Education and E-Learning
  • Anomaly Detection Techniques and Applications
  • Intraocular Surgery and Lenses
  • Parallel Computing and Optimization Techniques
  • French Historical and Cultural Studies
  • Ocular Surface and Contact Lens
  • Digital Economy and Work Transformation
  • Semantic Web and Ontologies
  • Operations Management Techniques
  • Ocular Infections and Treatments
  • Cloud Computing and Resource Management
  • Ocular Diseases and Behçet’s Syndrome
  • Quality and Supply Management

University of Namur
2013-2023

Département d'Informatique
2011-2013

University of Pittsburgh
2008

Oracle (United States)
2006

University of Mons
2002

Hôpital Robert-Debré
1998

Machine Learning (ML) and Deep (DL) have been used for building Intrusion Detection Systems (IDS). The increase in both the number sheer variety of new cyber-attacks poses a tremendous challenge IDS solutions that rely on database historical attack signatures. Therefore, industrial pull robust IDSs are capable flagging zero-day attacks is growing. Current outlier-based detection research suffers from high false-negative rates, thus limiting their practical use performance. This paper...

10.3390/electronics9101684 article EN Electronics 2020-10-14

The rapid growth of mobile applications has imposed new threats to privacy: users often find it challenging ensure that their privacy policies are consistent with the requirements a diverse range access personal information under different contexts. This problem exacerbates when depend on each other and therefore share permissions resources in ways opaque an end-user. To meet needs representing resolving dependencies issues policies, we pro-pose extension P-RBAC model for reasoning about...

10.1109/policy.2011.25 article EN IEEE International Symposium on Policies for Distributed Systems and Networks 2011-06-01

ABAC allows for high flexibility in access control over a system through the definition of policies based on attribute values.In context an IoT-based system, these data can be supplied its sensors connected to real world, allowing context-awareness.However, model alone does not include proposals implementing security verified and/or meaningful values rather than raw flowing from sensors.Nor it allow implement immediate action when some flaw is detected, while this possibility technically...

10.5220/0006815803330339 article EN cc-by-nc-nd 2018-01-01

We are now living in the significant era where technologies advancing very quickly. Among leading technologies, Internet of Things or IoT short is standing at peak inflated expectation Gartner Hype Cycle [1]. The application has evolved from home appliances smart environment such as tv, refrigerator, door and grown into building, city, healthcare, industry. could imagine that everything go online to cut cost, add value businesses increase users convenience. prediction been made [2] there...

10.1145/3287921.3287933 article EN 2018-01-01

IoT technology allows people to connect and control devices remotely anywhere anytime. However, serious concerns are raised over access of sensitive (e.g. portable health device) personal information pertaining them. The static model used in conventional system, which does not take into account the profile behaviour agent requesting system determine risk associated with request, fit well be some scenarios application domains smart healthcare). In this paper, we propose an adaptive risk-aware...

10.1109/siot.2017.00010 article EN 2017-09-01

To proactively defend computer systems against cyber-attacks, a honeypot system—purposely designed to be prone attacks—is commonly used detect attacks, discover new vulnerabilities, exploits or malware before they actually do real damage systems. Its usefulness lies in being able operate without identified as trap by adversaries; otherwise, its values are significantly reduced. A is classified the degree of interactions that provide attacker: low, medium and high-interaction honeypots....

10.3390/app12105224 article EN cc-by Applied Sciences 2022-05-21

Smart home user usually controls smart devices through application, which is managed by user's account. Thus, compromised account possible and countermeasure to such attack can help protect both data pertaining them. In this paper, we propose a security in case of system introducing another layer access control beyond the traditional authentication method (e.g. username password). our proposed approach, although successfully authenticated, he subjects at or permission level for every attempt...

10.1109/wimob.2017.8115827 article EN 2017-10-01

Privacy-aware usage control is a of the private data with aim to protect owner privacy. In privacy-aware system, purpose strictly controlled ensure that privacy properly protected and would never be used beyond what it authorized for. To fulfill level protection, requires strong enforcement policy, in particular, usage. However, there are many difficulties enforcement. One which validate an agent when requests perform action, particularly distributed environments where processing carried out...

10.1145/2557977.2557991 article EN 2014-01-09

LIMBS is an open source brokerage system developed in the framework of CALIBRATE project. relies on standards and contents to promote exchanges learning resources within a federation e-learning systems. Contrary CELEBRATE system, from which it derives, LIMBS's role limited carrying routing messages exchanged by members rather than enforcing semantic interoperability. With LIMBS, interoperability becomes responsibility that rely "clients" communicate with support negotiation common query...

10.1109/icalt.2006.1652534 article EN 2006-08-02

In this paper, we present a model for licensing scheme that allows the expression, negotiation and management of digital rights, in federated object-sharing environment. We first discuss motivations issues around rights (DRM), then describe DRM implementation celebrate project, propose an extension to order take into account licenses as opposed individual rights.

10.1109/wec.2004.1319508 article EN 2004-11-12

Enforcing the purpose of data usage means to ensure that are used as it intends for and excessive cannot happen. In general, enforcement is a complicated task. The main difficulty identify an agent when requests perform action. this paper, we discuss design issue model based on our proposed structure: pre–, ongoing–, post–enforcement. We also propose solution control designed distributed healthcare information system, particularly, pre– ongoing–enforcement purpose. Furthermore, validate with...

10.1504/ijsn.2013.055943 article EN International Journal of Security and Networks 2013-01-01

In this paper, we present a model for licensing scheme that allows the expression, negotiation and management of digital rights, in federated object-sharing environment. We first discuss motivations issues around rights (DRM), then describe DRM implementation celebrate project, propose an extension to order take into account licenses as opposed individual rights.

10.1109/wec.2004.1 article EN 2004-07-06

Purpose of access is one the core concepts in privacy which considers data user's intent as a factor making control decisions and enforcement purpose required to ensure that used what it intends for. In general, complicated task. The main difficulty how identify an agent when requests perform action. this paper, we discuss design issue based on our proposed (defined) structure: pre-enforcement, ongoing-enforcement, post-enforcement. We also propose solution for usage designed distributed...

10.1109/ccnc.2013.6488578 article EN 2013-01-01

The paper reports on the current research activities related to delivery of a federated global identity management framework for provisioning secure ICT services; this represents significant step towards development security services Web, Grid and particularly future Mobile Wireless communication (ICT platforms). overall aim is provide seamless traversal access distributed resources in heterogeneous Grid, spaces. Furthermore, order consider value usefulness Trust-ME its strategic impact...

10.1109/itng.2006.117 article EN 2006-01-01
Coming Soon ...