Auswahl der wissenschaftlichen Literatur zum Thema „Sécurité des applications“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Sécurité des applications" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Sécurité des applications"
Pellet, Rémi. „L’articulation des lois financières entre elles et avec les lois ordinaires À propos d’une certaine « inculture constitutionnelle »“. Gestion & Finances Publiques, Nr. 6 (November 2023): 30–35. http://dx.doi.org/10.3166/gfp.2023.6.005.
Der volle Inhalt der QuelleLatulippe, Gérard P., und Kevin O’Farrell. „Le comité paritaire : anachronisme ou formule d’avenir“. Relations industrielles 37, Nr. 3 (12.04.2005): 634–55. http://dx.doi.org/10.7202/029283ar.
Der volle Inhalt der QuelleSaoudi, Messaoud. „Le contrôle des principes budgétaires applicables aux lois de financement de la Sécurité sociale“. Gestion & Finances Publiques, Nr. 6 (November 2023): 15–22. http://dx.doi.org/10.3166/gfp.2023.6.003.
Der volle Inhalt der QuelleRenaut, Éric. „L’ Eurocorps : un modèle de synergie pour les applications européennes de sécurité et de défense ?“ Revue Défense Nationale N° 867, Nr. 2 (12.02.2024): 93–98. http://dx.doi.org/10.3917/rdna.867.0093.
Der volle Inhalt der QuelleAllaert, François-André, Noël-Jean Mazen, Louis Legrand und Catherine Quantin. „Les enjeux de la sécurité des objets connectés et applications de santé“. Journal de gestion et d'économie médicales 34, Nr. 5 (2016): 311. http://dx.doi.org/10.3917/jgem.165.0311.
Der volle Inhalt der QuelleOlsson, Christian. „De la sécurité à la violence organisée : tropismes et points aveugles de « l’école de Copenhague »“. Études internationales 46, Nr. 2-3 (11.02.2016): 211–30. http://dx.doi.org/10.7202/1035178ar.
Der volle Inhalt der QuelleÖnen, Melek, Francesco Cremonesi und Marco Lorenzi. „Apprentissage automatique fédéré pour l’IA collaborative dans le secteur de la santé“. Revue internationale de droit économique XXXVI, Nr. 3 (21.04.2023): 95–113. http://dx.doi.org/10.3917/ride.363.0095.
Der volle Inhalt der QuelleDufour, Anne Claire. „Le contrôle des dispositions des lois de financement de la Sécurité sociale Les « cavaliers sociaux »“. Gestion & Finances Publiques, Nr. 6 (November 2023): 23–29. http://dx.doi.org/10.3166/gfp.2023.6.004.
Der volle Inhalt der QuelleDort, Aurélie. „Le contrôle des modalités d’adoption des lois de financement de la Sécurité sociale, l’illustration d’un équilibre d’apparence“. Gestion & Finances Publiques, Nr. 6 (November 2023): 7–14. http://dx.doi.org/10.3166/gfp.2023.6.002.
Der volle Inhalt der QuelleZeller, Olivia, Célia Guimberteau und Samuel Pouplin. „Objets connectés : facilitateurs d’une plus grande indépendance“. Contraste N° 57, Nr. 1 (20.03.2023): 51–62. http://dx.doi.org/10.3917/cont.057.0051.
Der volle Inhalt der QuelleDissertationen zum Thema "Sécurité des applications"
Cherif, Amina. „Sécurité des RFIDs actifs et applications“. Thesis, Limoges, 2021. http://www.theses.fr/2021LIMO0015.
Der volle Inhalt der QuelleOver the 30 last years, active RFID devices have evolved from nodes dedicated to identification to autonomous nodes that, in addition, sense (from environment or other sources) and exchange data. Consequently, the range of their applications has rapidly grown from identification only to monitoring and real time localisation. In recent years, thanks to their advantages, the use of active RFID nodes for mobile data collection has attracted significant attention. However, in most scenarios, these nodes are unattended in an adverse environments, so data must be securely stored and transmitted to prevent attack by active adversaries: even if the nodes are captured, data confidentiality must be ensured. Furthermore, due to the scarce resources available to nodes in terms of energy, storage and/or computation, the used security solution has to be lightweight. This thesis is divided in two parts. In the first, we will study in details the evolution of active RFID nodes and their security. We will then, present, in the second part, a new serverless protocol to enable MDCs (Mobile Data Collectors), such as drones, to collect data from mobile and static Active RFID nodes and then deliver them later to an authorized third party. The whole solution ensures data confidentiality at each step (from the sensing phase, before data collection by the MDC, once data have been collected by MDC, and during final delivery) while fulfilling the lightweight requirements for the resource-limited entities involved. To assess the suitability of the protocol against the performance requirements, we will implement it on the most resource-constrained secure devices to prove its efficiency even in the worst conditions. In addition, to prove the protocol fulfills the security requirements, we will analyze it using security games and we will also formally verify it using the AVISPA and ProVerif tools
Luo, Zhengqin. „Sémantique et sécurité des applications Web“. Nice, 2011. http://www.theses.fr/2011NICE4058.
Der volle Inhalt der QuelleIn this work we study the formal semantics and security problems of Web applications. The thesis is divided into three parts. The first part proposes a small-step operational semantics for a multitier programing language HOP, which can be used to globally reasoning about Web applications. The semantics covers a core of the HOP language, including dynamic generations of client code, and interactions between servers and clients. The second part studies a new technique to automatically prevent code injection attacks, based on multitier compilation. We add a new phase in the compiler to compare the intended and the actual syntax structure of the output. The validity of our technique is proved correct in the operational semantics of HOP. The last part of the thesis studies Mashic, a source-to-source compiler of JavaScript to isolate untrusted script by ifram sandbox and postmessage in HTML5. The compiler is proved correct in a formal semantics of JavaScript
Vayssière, Julien. „Une architecture de sécurité pour les applications réflexives : application à Java“. Nice, 2002. http://www.theses.fr/2002NICE5772.
Der volle Inhalt der QuelleHadhiri, Amine. „Sécurité des applications androïde : menaces et contre-mesures“. Mémoire, École de technologie supérieure, 2012. http://espace.etsmtl.ca/1008/1/HADHIRI_Amine.pdf.
Der volle Inhalt der QuelleSomé, Dolière Francis. „Sécurité et vie privée dans les applications web“. Thesis, Université Côte d'Azur (ComUE), 2018. http://www.theses.fr/2018AZUR4085/document.
Der volle Inhalt der QuelleIn this thesis, we studied security and privacy threats in web applications and browser extensions. There are many attacks targeting the web of which XSS (Cross-Site Scripting) is one of the most notorious. Third party tracking is the ability of an attacker to benefit from its presence in many web applications in order to track the user has she browses the web, and build her browsing profile. Extensions are third party software that users install to extend their browser functionality and improve their browsing experience. Malicious or poorly programmed extensions can be exploited by attackers in web applications, in order to benefit from extensions privileged capabilities and access sensitive user information. Content Security Policy (CSP) is a security mechanism for mitigating the impact of content injection attacks in general and in particular XSS. The Same Origin Policy (SOP) is a security mechanism implemented by browsers to isolate web applications of different origins from one another. In a first work on CSP, we analyzed the interplay of CSP with SOP and demonstrated that the latter allows the former to be bypassed. Then we scrutinized the three CSP versions and found that a CSP is differently interpreted depending on the browser, the version of CSP it implements, and how compliant the implementation is with respect to the specification. To help developers deploy effective policies that encompass all these differences in CSP versions and browsers implementations, we proposed the deployment of dependency-free policies that effectively protect against attacks in all browsers. Finally, previous studies have identified many limitations of CSP. We reviewed the different solutions proposed in the wild, and showed that they do not fully mitigate the identified shortcomings of CSP. Therefore, we proposed to extend the CSP specification, and showed the feasibility of our proposals with an example of implementation. Regarding third party tracking, we introduced and implemented a tracking preserving architecture, that can be deployed by web developers willing to include third party content in their applications while preventing tracking. Intuitively, third party requests are automatically routed to a trusted middle party server which removes tracking information from the requests. Finally considering browser extensions, we first showed that the extensions that users install and the websites they are logged into, can serve to uniquely identify and track them. We then studied the communications between browser extensions and web applications and demonstrate that malicious or poorly programmed extensions can be exploited by web applications to benefit from extensions privileged capabilities. Also, we demonstrated that extensions can disable the Same Origin Policy by tampering with CORS headers. All this enables web applications to read sensitive user information. To mitigate these threats, we proposed countermeasures and a more fine-grained permissions system and review process for browser extensions. We believe that this can help browser vendors identify malicious extensions and warn users about the threats posed by extensions they install
Mouelhi, Tejeddine. „Modélisation et test de mécanismes de sécurité dans des applications internet“. Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-00544431.
Der volle Inhalt der QuelleMakiou, Abdelhamid. „Sécurité des applications Web : Analyse, modélisation et détection des attaques par apprentissage automatique“. Thesis, Paris, ENST, 2016. http://www.theses.fr/2016ENST0084/document.
Der volle Inhalt der QuelleWeb applications are the backbone of modern information systems. The Internet exposure of these applications continually generates new forms of threats that can jeopardize the security of the entire information system. To counter these threats, there are robust and feature-rich solutions. These solutions are based on well-proven attack detection models, with advantages and limitations for each model. Our work consists in integrating functionalities of several models into a single solution in order to increase the detection capacity. To achieve this objective, we define in a first contribution, a classification of the threats adapted to the context of the Web applications. This classification also serves to solve some problems of scheduling analysis operations during the detection phase of the attacks. In a second contribution, we propose an architecture of Web application firewall based on two analysis models. The first is a behavioral analysis module, and the second uses the signature inspection approach. The main challenge to be addressed with this architecture is to adapt the behavioral analysis model to the context of Web applications. We are responding to this challenge by using a modeling approach of malicious behavior. Thus, it is possible to construct for each attack class its own model of abnormal behavior. To construct these models, we use classifiers based on supervised machine learning. These classifiers use learning datasets to learn the deviant behaviors of each class of attacks. Thus, a second lock in terms of the availability of the learning data has been lifted. Indeed, in a final contribution, we defined and designed a platform for automatic generation of training datasets. The data generated by this platform is standardized and categorized for each class of attacks. The learning data generation model we have developed is able to learn "from its own errors" continuously in order to produce higher quality machine learning datasets
Serme, Gabriel. „Modularisation de la sécurité informatique dans les systèmes distribués“. Electronic Thesis or Diss., Paris, ENST, 2013. http://www.theses.fr/2013ENST0063.
Der volle Inhalt der QuelleAddressing security in the software development lifecycle still is an open issue today, especially in distributed software. Addressing security concerns requires a specific know-how, which means that security experts must collaborate with application programmers to develop secure software. Object-oriented and component-based development is commonly used to support collaborative development and to improve scalability and maintenance in software engineering. Unfortunately, those programming styles do not lend well to support collaborative development activities in this context, as security is a cross-cutting problem that breaks object or component modules. We investigated in this thesis several modularization techniques that address these issues. We first introduce the use of aspect-oriented programming in order to support secure programming in a more automated fashion and to minimize the number of vulnerabilities in applications introduced at the development phase. Our approach especially focuses on the injection of security checks to protect from vulnerabilities like input manipulation. We then discuss how to automate the enforcement of security policies programmatically and modularly. We first focus on access control policies in web services, whose enforcement is achieved through the instrumentation of the orchestration mechanism. We then address the enforcement of privacy protection policies through the expert-assisted weaving of privacy filters into software. We finally propose a new type of aspect-oriented pointcut capturing the information flow in distributed software to unify the implementation of our different security modularization techniques
Fila, Barbara. „Automates pour l'analyse de documents XML compressés, applications à la sécurité d'accès“. Phd thesis, Université d'Orléans, 2008. http://tel.archives-ouvertes.fr/tel-00491193.
Der volle Inhalt der QuelleFila-Kordy, Barbara. „Automates pour l'analyse de documents XML compressés, applications à la sécurité d'accès“. Orléans, 2008. http://www.theses.fr/2008ORLE2029.
Der volle Inhalt der QuelleBücher zum Thema "Sécurité des applications"
A, Benwell-Morison Deirdre, und Canada. Direction de l'hygiène du milieu., Hrsg. Principes d'utilisation des ultrasons: Partie II. Applications industrielles et commerciales. Ottawa, Ont: Direction de l'hygiène du milieu, 1991.
Den vollen Inhalt der Quelle findenBly, Stephen Howard Perry. Principes d'utilisation des ultrasons: 1re partie. Applications médicales et paramédicales. Ottawa, Ont: Direction de l'hygiène du milieu, 1989.
Den vollen Inhalt der Quelle findenAmerican Society of Safety Engineers, Hrsg. The safety professionals handbook: Management applications. 2. Aufl. Des Plaines, Ill: American Society of Safety Engineers, 2012.
Den vollen Inhalt der Quelle finden(Firm), BP, und Institution of Chemical Engineers (Great Britain), Hrsg. Hazards of air and oxygen. 8. Aufl. Rugby, UK: IChemE, 2004.
Den vollen Inhalt der Quelle findenMike, Shema, Hrsg. Hacking exposed: Web applications. New York: McGraw-Hill/Osborne, 2002.
Den vollen Inhalt der Quelle findenScambray, Joel. Hacking exposed: Web applications. New York: McGraw-Hill/Osborne, 2002.
Den vollen Inhalt der Quelle findenCordoliani, Y. S. Radioprotection en milieu médical. Paris: Masson, 2005.
Den vollen Inhalt der Quelle findenOccupational ergonomics: Theory and applications. 2. Aufl. Boca Raton, FL: Taylor & Francis, 2012.
Den vollen Inhalt der Quelle findenCryptography for Internet and database applications: Developing secret and public key techniques with Java. Indianapolis, Ind: Wiley Pub., 2002.
Den vollen Inhalt der Quelle finden(Firm), BP, und Institution of Chemical Engineers (Great Britain), Hrsg. Hazards of water. 8. Aufl. Rugby: Institution of Chemical Engineers, 2004.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Sécurité des applications"
CHARRIER, Christophe, Christophe ROSENBERGER und Amine NAIT-ALI. „Biométrie et applications“. In Sécurité multimédia 2, 9–40. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9027.ch1.
Der volle Inhalt der QuelleSYLLA, Tidiane, Mohamed-Aymen CHALOUF und Francine KRIEF. „Adaptation du niveau de sécurité des applications IoT“. In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 251–75. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch10.
Der volle Inhalt der QuelleBEUGNON, Sébastien, Pauline PUTEAUX und William PUECH. „Partage d’images et d’objets 3D secrets“. In Sécurité multimédia 2, 279–312. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9027.ch8.
Der volle Inhalt der QuelleMBAYE, Maïssa, und Omessaad HAMDI. „Un plan de contrôle intelligent pour le déploiement de services de sécurité dans les réseaux SDN“. In Gestion et contrôle intelligents des réseaux, 29–67. ISTE Group, 2020. http://dx.doi.org/10.51926/iste.9008.ch2.
Der volle Inhalt der QuelleSEMMOUD, Abderrazaq, und Badr BENMAMMAR. „La sécurité intelligente des réseaux informatiques“. In Gestion et contrôle intelligents des réseaux, 5–28. ISTE Group, 2020. http://dx.doi.org/10.51926/iste.9008.ch1.
Der volle Inhalt der QuelleWAHL, Martine, und Patrick SONDI. „Enjeux autour des communications ad hoc sur la route“. In Conception et évaluation de protocole de routage ad hoc, 5–15. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch1.
Der volle Inhalt der QuelleSAMMOUD, Amal, Omessaad HAMDI, Mohamed-Aymen CHALOUF und Nicolas MONTAVONT. „Apports de la biométrie et de l’intelligence artificielle dans la sécurisation de l’IoT“. In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 205–30. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch8.
Der volle Inhalt der QuelleAYMEN CHALOUF, Mohamed, Hana MEJRI und Omessaad HAMDI. „Intelligence artificielle pour la sécurité en e-santé“. In Gestion de la sécurité en e-santé, 213–35. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9179.ch9.
Der volle Inhalt der QuelleLAHSINI, Cyrine, Faiza HAMDI und Omessaad HAMDI. „Application de la blockchain dans la e-santé“. In Gestion de la sécurité en e-santé, 107–36. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9179.ch5.
Der volle Inhalt der QuelleLATA, Manju, und Vikas KUMAR. „La sécurité des réseaux IdO dans la maison connectée“. In Cybersécurité des maisons intelligentes, 163–84. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch4.
Der volle Inhalt der Quelle