Jean-Marc Dinant
Université de Namur
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jean-Marc Dinant.
Computer Law & Security Review | 2003
Ewout Keuleers; Jean-Marc Dinant
Abstract This article, consisting of three parts, will comment on how the opportunities offered by multi-application smart card schemes can be reconciled with data protection requirements. In the first part, the focus will be on the regulatory framework of the smart card manufacturer and the legal requirements to develop less privacy-killing technologies. Hereafter, some technical solutions will be proposed to demonstrate that multi-application smart card technology can be reconciled with the principles of personal data protection legislation. In the third and final part, the communication of personal data through electronic communications networks will be analysed. In relation hereto, it must be indicated that intelligent servers will become increasingly important to assure the interoperability between different application providers and different smart card schemes.
International Review of Law, Computers & Technology | 2004
Jean-Marc Dinant
Generally, traces of Internet communications established by a citizens computer are routinely recorded on and dated by Internet servers in so‐called ‘log files’. As far as the correct dating of the electronic offence is crucial for the potential identification of the author, convincing traces need to be date‐ and time‐stamped by a Trusted Third Party (TTP). Such a time stamp does not give any assurance about the correctness of the data and dates collected, but only proves that the traffic data were in a given state at a given date and time. If the Internet Provider (IP) address appears to be one used by the company, it is foreseeable that the system administrator within the company will be able to identify the computer owning a particular IP address. In others cases, only law enforcement agencies, in the circumstances and the conditions required by the law, are entitled to identify, with the help of Internet Access Providers (IAPs), the communication line suspected to have been used beside a given IP address. Putting together the traces left at the IAP side and in the log files of the attacked server site may lead, in the best cases, to an identified communication terminal. Nevertheless, in many cases, this will not be a formal authentication of a wrongdoer.
International Journal of Law and Information Technology | 2007
Romain Robert; Mark Manulis; Florence de Villenfagne; Damien Leroy; Julien Jost; François Koeune; Caroline Ker; Jean-Marc Dinant; Yves Poullet; Olivier Bonaventure; Jean-Jacques Quisquater
WiFi technology has become the preferable form for mobile users to connect to the Internet. The growing popularity of WiFi-enabled devices and the increasing number of WiFi networks guarantees that this trend will continue in the future. Since a single network provider is usually not able to ensure WiFi coverage for its own users across many geographic locations the WiFi roaming technology appears to be the promising solution. A special attention upon the practical deployment of WiFi roaming should be paid to possible threats coming from the misuse of technology. In this light we analyze various legal implications that might become relevant due to the deployment of WiFi roaming and discuss several risks and problems related to the security during the establishment of roaming connections between mobile devices and the Internet.
Computer Law & Security Review | 2004
Jean-Marc Dinant; Ewout Keuleers
Abstract In the first part of this paper, 1 the underlying privacy concerns of multi-application smart card schemes were identified. In relation to the use of global unique identifiers, the regulatory framework for the smart card manufacturer was assessed. To demonstrate that multi-application smart card technology can be reconciled with the principles of data protection legislation, in particular with the requirements that personal data be processed fairly and lawfully, 2 three technical solutions will now be analysed and commented upon. 3 The first two solutions will relate to the role and functioning of the schemes application providers. The third solution consists of the development of a less privacy-infringing smart card technology in relation to the use of unique identifiers.
Archive | 1999
Jean-Marc Dinant
Archive | 2009
Jean-Marc Dinant
IDP Revista de Internet Derecho y Política | 2007
Jean-Marc Dinant; Yves Poullet
Computer Law & Security Review | 2005
Ewout Keuleers; Jean-Marc Dinant
Archive | 2000
Jean-Marc Dinant; Yves Poullet
Archive | 2010
Jean-Marc Dinant