Auswahl der wissenschaftlichen Literatur zum Thema „Gestion des identités numériques“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Gestion des identités numériques" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Gestion des identités numériques"
Ollier-Malaterre, Ariane. „La compétence numérique de gestion des frontières sur les réseaux sociaux numériques : un capital culturel technologique à la Bourdieu“. Section 2 – Les nouveaux espaces et les nouvelles temporalités : flexibilisation, invisibilité et brouillage des frontières, Nr. 81 (19.02.2019): 121–37. http://dx.doi.org/10.7202/1056307ar.
Der volle Inhalt der QuelleGrevisse, YENDE RAPHAEL, LOWEMBO A. TSHOTSHO Raymond-Albert, KABIENA KABASELE Emmanuel, MUKENDI MALUNDA Cedrick, KENA MULUMBA Clovis, KANDA KABAMBA Isaac und BUKASA MUKENGESHAYI Jean-Claude. „DEMATERIALISATION ET FRAUDE NUMERIQUE DES DOCUMENTS DANS LE SECTEUR DE L’ENSEIGNEMENT SUPERIEUR ET UNIVERSITAIRE EN RDC : Enjeux et Contraintes des TIC.“ International Journal of Electrical and Electronics Engineering Studies 8, Nr. 2 (15.02.2022): 30–45. http://dx.doi.org/10.37745/ijeees.13/vol8n23045.
Der volle Inhalt der QuelleMorgand, Audrey. „Le rôle des plateformes numériques de rencontres professionnelles : apports, limites et risques“. Management & Sciences Sociales N° 34, Nr. 1 (01.01.2023): 21–38. http://dx.doi.org/10.3917/mss.034.0021.
Der volle Inhalt der QuelleWEREY, C., A. MEISTER, P. DI MAIOLO und C. CURT. „Gestion des eaux pluviales et prévention des inondations : quelle communication par les collectivités ?“ 12, Nr. 12 (20.01.2022): 93–118. http://dx.doi.org/10.36904/tsm/202112093.
Der volle Inhalt der QuelleMathias, Paul. „Note introductive aux identités numériques“. Cités 39, Nr. 3 (2009): 59. http://dx.doi.org/10.3917/cite.039.0059.
Der volle Inhalt der QuelleGeorges, Fanny. „Pratiques informationnelles et identités numériques“. Études de communication, Nr. 35 (01.12.2010): 105–20. http://dx.doi.org/10.4000/edc.2226.
Der volle Inhalt der QuelleCantin, Richard, und Jean-Claude Cryonnet. „Strategies d’identification des data utiles à la conduite d’opérations de construction“. Acta Europeana Systemica 7 (11.07.2020): 51–64. http://dx.doi.org/10.14428/aes.v7i1.56633.
Der volle Inhalt der QuelleJacopin, Bertrand, Emilie Andries, Yohann Beureno, Fabienne Mercier, Pierre-Yves Valantin und Yann Laborda. „Atlas dynamique des zones inondables : outil operationnel d'aide à la décision“. La Houille Blanche, Nr. 1 (Februar 2019): 13–18. http://dx.doi.org/10.1051/lhb/2019002.
Der volle Inhalt der QuellePinède, Nathalie. „Du site web aux identités numériques organisationnelles“. Questions de communication, Nr. 34 (31.12.2018): 75–94. http://dx.doi.org/10.4000/questionsdecommunication.15587.
Der volle Inhalt der QuelleGeorges, Fanny. „« A l'image de l'Homme » : cyborgs, avatars, identités numériques“. Le Temps des médias 18, Nr. 1 (2012): 136. http://dx.doi.org/10.3917/tdm.018.0136.
Der volle Inhalt der QuelleDissertationen zum Thema "Gestion des identités numériques"
Ates, Mikaël. „Identités numériques : gestion inter-organisationnelle centrée sur l'utilisateur et respectueuse de la vie privée“. Phd thesis, Université Jean Monnet - Saint-Etienne, 2009. http://tel.archives-ouvertes.fr/tel-00443910.
Der volle Inhalt der QuelleMarillonnet, Paul. „La gestion des données personnelles par l'usager au sein des collectivités locales“. Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS011.
Der volle Inhalt der QuelleThis Ph.D. addresses the user-centric management of Personally Identifiable Information (PII) within local collectivities. It has been realized as part of a CIFRE program between SAMOVAR and Entr’ouvert. There is a strong need to provide the users of the collectivities' online service with some PII management tools for respecting their privacy when submitting online requests to their collectivities. This need is also coupled with the challenges of free software (including open access to the code, and possibility to evaluate the software's security), which is part of Entr’ouvert’s philosophy. For illustration, a realistic use case is identified for the specific context of territorial collectivities and the public administration (TCPA). It enables to establish a list of useful functional requirements, and a set of users capabilities regarding the management of their own PII. The first contribution is about a technical comparative survey of academic and industrial solutions. This survey identifies thirteen solutions belonging to four different categories, and evaluates them according to eighteen functional criteria. Eventually, the survey provides per-category synthesis and identifies an optimal solution for our use case. The second contribution proposes a solution for supporting PII management, which respects the guidelines identified earlier as part of the survey's optimal solution. It also takes into consideration the PII retrieval from third-party sources. The solution, called the PII manager, operates thanks to its three main components: [i] the Source Backend (SB), [ii] the PII Query Interface (PQI) and [iii] the PII Management User Interface (PMUI). A detailed description of each of these three components is given in the manuscript. Additionally, the user-identifier mapping performed by the PQI is identified as a critical part of the solution. It requires security considerations, as failing to verify the consistency of this mapping can enable four types of attacks. The third contribution proposes an identity-matching solution to counteract the previously identified attacks. Indeed, there is a need to verify the validity of user identity information retrieved across several PII sources. This identity-matching solution requires to identify which components of the architecture is involved in that processing, the workflow across these components to support the full processing, and to perform a security analysis of the workflow that proves its strength against identified attempted attacks. The fourth contribution is the software validation of the proposed solutions through a proof of concept. The identity-matching solution is implemented thanks to the Django template filters and Entr’ouvert’s existing User-Relationship Management (URM) tool. The PII manager is also implemented as a new component to the existing software platform. Eventually, new perspectives are drawn. For instance, this research work could benefit from upcoming protocols such as the Grant Negotiation & Authorization Protocol (GNAP). Other new perspectives include the integration of the System for Cross-domain Identity Management (SCIM) into the platform and a larger-scale software validation
Masmoudi, Souha. „Malleable privacy-enhancing-technologies for privacy-preserving identity management systems“. Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS023.
Der volle Inhalt der QuelleDigital identities are, nowadays, used at a large scale (i.e., in public services, social medias, at work, online shopping, etc.). This brings usability issues as users are constrained to deal with multiple identities and attributes for access control and data sharing objectives. In addition, security and privacy challenges have arisen as the interacting entities, those that issue, process and collect these identities can, due to their behavior or security deficiencies, lead to identity theft, massive data collection and tracking of users' behaviors on the Internet.This thesis aims at finding the best trade-off between security, privacy and usability for identity management systems, based on cryptographic primitives. The first two contributions focus on identity management for access control and consider real identities and attributes that contain personal (e.g., age) and sensitive (e.g., biometric traits) information.The first contribution proposes a user-centric and privacy-preserving identity management system in which users keep control over their attributes. A user, that receives attributes certified by an identity provider, is able to interact, in a pseudonymized manner, with a service provider and prove the authenticity of the provided attributes while ensuring that he discloses only the minimum number of attributes. This solution is based on a new malleable signature scheme that allows users to modify the certificate issued by the identity provider on his attributes in a restricted and controlled manner. It also preserves privacy by satisfying the unlinkability property between curious service providers that try to link different transactions to the same user.The second contribution presents a new biometric authentication scheme that offers robustness and privacy guarantees. Three steps are required. First, the user physically visits the identity provider that pushes an encrypted and certified biometric template onto his smartphone. Then he remotely enrolls at a service provider, in an anonymous manner. Finally, he authenticates offline to the service provider that captures a new biometric template in order to be locally verified via the smartphone. By relying on malleable signatures, the proposed solution prevents the use of fake biometric identities and guarantees the authentication soundness. Unlinkability and anonymity are also preserved.The third contribution provides a solution to meet the need of data sharing in an identity management system. In particular, it studies the management of users ephemeral attributes in the context of proximity tracing for e-healthcare systems. The proposed solution ensures data consistency and integrity and preserves the privacy of users who share their contact information with people in proximity. Alerts are issued to users who have been in contact with infected persons. The use of a hybrid architecture, which relies on a centralized server and decentralized proxies, allows to prevent malicious users from injecting false alerts, and to prevent the linkability of contact information to the same user and the re-identification of users involved in contact with an infected person
Abakar, Mahamat Ahmat. „Etude et mise en oeuvre d'une architecture pour l'authentification et la gestion de documents numériques certifiés : application dans le contexte des services en ligne pour le grand public“. Phd thesis, Université Jean Monnet - Saint-Etienne, 2012. http://tel.archives-ouvertes.fr/tel-00975965.
Der volle Inhalt der QuelleChanton, Olivier. „Stratégies de gestion des identités et influence sociale“. Paris 10, 1999. http://www.theses.fr/1999PA100120.
Der volle Inhalt der QuelleAissaoui, Mehrez Hassane. „Sécurité pour les réseaux du futur : gestion sécurisée des identités“. Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066606.
Der volle Inhalt der QuelleToday, the Internet is changing radically our habits, especially with the massive influx of the nomadic techniques, the Internet of objects, the growing use of grid computing, wireless networks and the emergence of new approaches in recent years. In particular, the virtualization of the computing infrastructures, which allowed defining a new model called Cloud Computing, introducing an enough frank breakdown with the traditional models, can be perceived as a preparatory stage towards the Internet of future.The implementation of these approaches allows, in a different way : mutualization and organization of the computer system. It allows to dematerialize the physical infrastructures and to deport applications on distant containers. Therefore, the global architecture of Internet should be evolved. It will rely strongly on these new approaches and in particular, Cloud Computing and virtualization. However, no system is infallible especially if resources are distributed and mutualized. They raise a number of problems and involve directly security issues, which remain one of the main barriers to the adoption of these technologies.Like any new technology, Cloud Computing and virtualization create new risks, which come to graft to traditional threats of the outsourcing management of the privilege separation, the identity and accesses management, the robustness of the virtualization software, the virtual machine isolation, the personal data protection, reversibility, privacy... The traditional Internet architecture cannot provide the adequate solutions to the challenges raised by these new approaches: mobility, flexibility, security requirements, reliability and robustness. Thus, a research project (SecFuNet : Security For Future Networks) was validated by the European Commission, to provide some answers, to make a state of the art of these security mechanisms and a comprehensive study of orchestration and integration techniques based on protection components within overall security architecture
Aissaoui, Mehrez Hassane. „Sécurité pour les réseaux du futur : gestion sécurisée des identités“. Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066606.
Der volle Inhalt der QuelleToday, the Internet is changing radically our habits, especially with the massive influx of the nomadic techniques, the Internet of objects, the growing use of grid computing, wireless networks and the emergence of new approaches in recent years. In particular, the virtualization of the computing infrastructures, which allowed defining a new model called Cloud Computing, introducing an enough frank breakdown with the traditional models, can be perceived as a preparatory stage towards the Internet of future.The implementation of these approaches allows, in a different way : mutualization and organization of the computer system. It allows to dematerialize the physical infrastructures and to deport applications on distant containers. Therefore, the global architecture of Internet should be evolved. It will rely strongly on these new approaches and in particular, Cloud Computing and virtualization. However, no system is infallible especially if resources are distributed and mutualized. They raise a number of problems and involve directly security issues, which remain one of the main barriers to the adoption of these technologies.Like any new technology, Cloud Computing and virtualization create new risks, which come to graft to traditional threats of the outsourcing management of the privilege separation, the identity and accesses management, the robustness of the virtualization software, the virtual machine isolation, the personal data protection, reversibility, privacy... The traditional Internet architecture cannot provide the adequate solutions to the challenges raised by these new approaches: mobility, flexibility, security requirements, reliability and robustness. Thus, a research project (SecFuNet : Security For Future Networks) was validated by the European Commission, to provide some answers, to make a state of the art of these security mechanisms and a comprehensive study of orchestration and integration techniques based on protection components within overall security architecture
Soenen, Guillaume. „Identités organisationnelles et communautés de pratique : Le cas d'une société de conseil“. Jouy-en Josas, HEC, 2006. http://www.theses.fr/2006EHEC0014.
Der volle Inhalt der QuelleThis thesis deals with organizational learning, and more specifically with learning organizations. I mobilize the concept of organizational identity and focuses on a specific mode of organizing: intra-organizational communities of practice. First, I develop a model conceptualizing organizational identity as a system composed of five interacting facets. Second, I articulate a renewed definition of communities of practice as collective answers to prescription failures. A quantitative study of four communities of practice allows the establishment of a link between membership into a community and individuals' preference for certain sources of knowledge. This result confirms that communities of practice are more than a mere linguistic formula and are a distinct psycho-sociological reality. In a third phase, a comparative study is used to reveal the factors which contribute to this specific form of social network that can be defined as an “organizational mousse”
Sagastizábal, Claudia A. „Quelques méthodes numériques d'optimisation : Application en gestion de stocks“. Paris 1, 1993. http://www.theses.fr/1993PA010067.
Der volle Inhalt der QuelleRaad, Joe. „Gestion d'identité dans des graphes de connaissances“. Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLA028/document.
Der volle Inhalt der QuelleIn the absence of a central naming authority on the Web of data, it is common for different knowledge graphs to refer to the same thing by different names (IRIs). Whenever multiple names are used to denote the same thing, owl:sameAs statements are needed in order to link the data and foster reuse. Such identity statements have strict logical semantics, indicating that every property asserted to one name, will also be inferred to the other, and vice versa. While such inferences can be extremely useful in enabling and enhancing knowledge-based systems such as search engines and recommendation systems, incorrect use of identity can have wide-ranging effects in a global knowledge space like the Web of data. With several studies showing that owl:sameAs is indeed misused for different reasons, a proper approach towards the handling of identity links is required in order to make the Web of data succeed as an integrated knowledge space. This thesis investigates the identity problem at hand, and provides different, yet complementary solutions. Firstly, it presents the largest dataset of identity statements that has been gathered from the LOD Cloud to date, and a web service from which the data and its equivalence closure can be queried. Such resource has both practical impacts (it helps data users and providers to find different names for the same entity), as well as analytical value (it reveals important aspects of the connectivity of the LOD Cloud). In addition, by relying on this collection of 558 million identity statements, we show how network metrics such as the community structure of the owl:sameAs graph can be used in order to detect possibly erroneous identity assertions. For this, we assign an error degree for each owl:sameAs based on the density of the community(ies) in which they occur, and their symmetrical characteristics. One benefit of this approach is that it does not rely on any additional knowledge. Finally, as a way to limit the excessive and incorrect use of owl:sameAs, we define a new relation for asserting the identity of two ontology instances in a specific context (a sub-ontology). This identity relation is accompanied with an approach for automatically detecting these links, with the ability of using certain expert constraints for filtering irrelevant contexts. As a first experiment, the detection and exploitation of the detected contextual identity links are conducted on two knowledge graphs for life sciences, constructed in a mutual effort with domain experts from the French National Institute of Agricultural Research (INRA)
Bücher zum Thema "Gestion des identités numériques"
préface de Jacques Perriault Coordonné par Alexandre Coutant et Thomas Stenger. Identités numériques. Paris: Editions L'Harmattan, 2013.
Den vollen Inhalt der Quelle findenPalamides, Thomas. Hollywood vinaigrette: Finding partnerships in digital entertainment = Vinaigrette à la Hollywood : former des partenariats dans l'industrie du divertissement numérique. Ottawa, Ont: Foreign Affairs and International Trade = Affaires étrangères et Commerce international, 2005.
Den vollen Inhalt der Quelle findenThomas, Palamides, und Canada. Consulate General (Los Angeles, Calif.), Hrsg. Hollywood vinaigrette: Finding partnerships in digital entertainment. [Los Angeles]: Consulate General of Canada, 2005.
Den vollen Inhalt der Quelle findenBarrett, Colin. Passez au numérique: Faites revivre le passé! Köln: Evergreen, 2006.
Den vollen Inhalt der Quelle findenAmerican Academy of Professional Coders, Hrsg. Official CPC certification study guide. Clifton Park, N.Y.]: Delmar Cengage Learning, 2014.
Den vollen Inhalt der Quelle finden1961-, Leow Wee-Kheng, Hrsg. Image and video retrieval: 4th international conference, CIVR 2005, Singapore, July 20-22, 2005 ; proceedings. Berlin: Springer, 2005.
Den vollen Inhalt der Quelle findenTittel, Ed. Computer telephony: Automating home offices and small businesses. Boston: AP Professional, 1996.
Den vollen Inhalt der Quelle findenTittel, Ed. Computer telephony: Automating home offices and small business. Boston: AP Professional, 1996.
Den vollen Inhalt der Quelle findenDigital asset management. 2. Aufl. Oxford: Focal, 2006.
Den vollen Inhalt der Quelle findenIntelligent image databases: Towards advanced image retrieval. Boston: Kluwer Academic Publishers, 1998.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Gestion des identités numériques"
Dumas, Geneviève. „Le livre de mémoires des notaires Bertrand Paul (1397-1400) et Jean du Pin (1401-1419) : gestion documentaire et mémoire urbaine“. In Les identités urbaines au Moyen Âge. Regards sur les villes du Midi français, 81–92. Turnhout: Brepols Publishers, 2014. http://dx.doi.org/10.1484/m.seuh-eb.5.101523.
Der volle Inhalt der QuelleFourmentraux, Jean-Paul. „Présentation générale. Identités et liaisons numériques“. In Identités numériques, 9–23. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20358.
Der volle Inhalt der Quelle„(Dé)jouer les identités numériques : Net art et médiactivisme“. In Identités numériques, 25–32. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20361.
Der volle Inhalt der QuelleDoueihi, Milad. „L’identité à l’ère des Digital Humanities“. In Identités numériques, 33–52. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20364.
Der volle Inhalt der QuelleCoutant, Alexandre. „Des techniques de soi ambivalentes“. In Identités numériques, 53–65. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20370.
Der volle Inhalt der QuelleParmentier, Marc. „Philosophie des sites de rencontres“. In Identités numériques, 67–80. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20373.
Der volle Inhalt der QuelleBeau, Frank. „Une figure du double numérique : l’avatar“. In Identités numériques, 81–96. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20379.
Der volle Inhalt der QuelleCardon, Dominique. „L’identité comme stratégie relationnelle“. In Identités numériques, 97–106. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20385.
Der volle Inhalt der QuelleLivingstone, Sonia, Giovanna Mascheroni und Maria Francesca Murru. „Utilisation des réseaux socionumériques par les jeunes Européens“. In Identités numériques, 107–25. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20388.
Der volle Inhalt der QuellePerriault, Jacques. „Géolocalisation et incertitude“. In Identités numériques, 127–31. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20397.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Gestion des identités numériques"
Joliveau, Thierry. „Voir le monde comme il paraît ou le rôle des visualisations réalistes dans la gestion territoriale“. In Paysages & valeurs : de la représentation à la simulation. Limoges: Université de Limoges, 2008. http://dx.doi.org/10.25965/as.3399.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Gestion des identités numériques"
Motulsky, Aude, Philippe Després, Cécile Petitgand, Jean Noel Nikiema, Catherine Régis und Jean-Louis Denis. Veille sur les outils numériques en santé dans le contexte de COVID-19. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, Oktober 2020. http://dx.doi.org/10.61737/gfie5726.
Der volle Inhalt der QuelleRousseau, Henri-Paul. Gutenberg, L’université et le défi numérique. CIRANO, Dezember 2022. http://dx.doi.org/10.54932/wodt6646.
Der volle Inhalt der QuelleMcAdams-Roy, Kassandra, Philippe Després und Pierre-Luc Déziel. La gouvernance des données dans le domaine de la santé : Pour une fiducie de données au Québec ? Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, Februar 2023. http://dx.doi.org/10.61737/nrvw8644.
Der volle Inhalt der Quelle