Auswahl der wissenschaftlichen Literatur zum Thema „Sécurité Internet“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Sécurité Internet" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Sécurité Internet"
Falque-Pierrotin, Isabelle. „Internet, sécurité et libertés“. Annales des Mines - Réalités industrielles Mai 2009, Nr. 2 (2009): 77. http://dx.doi.org/10.3917/rindu.092.0077.
Der volle Inhalt der QuelleNorodom, Anne-Thida. „La galaxie Internet“. Questions internationales 91-92, Nr. 3 (27.06.2018): 59–70. http://dx.doi.org/10.3917/quin.091.0059.
Der volle Inhalt der Quelle-CHICHE, Thierry. „La sécurité internet appliquée aux systèmes de production“. Revue de l'Electricité et de l'Electronique -, Nr. 06 (2001): 75. http://dx.doi.org/10.3845/ree.2001.069.
Der volle Inhalt der QuelleMeiller, Yannick. „La sécurité de l’information devrait être plus présente dans les programmes des écoles de management“. Sécurité et stratégie 32, Nr. 4 (19.03.2024): 12–16. http://dx.doi.org/10.3917/sestr.032.0012.
Der volle Inhalt der QuelleTschumi Canosa, Xavier, und Thania Paffenholz. „Coopération internationale entre paix et sécurité : portes d’entrée sur Internet“. Annuaire suisse de politique de développement, Nr. 25-2 (01.10.2006): 229–31. http://dx.doi.org/10.4000/aspd.282.
Der volle Inhalt der QuelleTschudi, Hunziker, Kündig, Lüscher, Freiermuth, Heller und Heberer. „Internet-Kommunikation zwischen Hausärzten und Universitätsspital“. Praxis 91, Nr. 7 (01.02.2002): 257–60. http://dx.doi.org/10.1024/0369-8394.91.7.257.
Der volle Inhalt der QuelleBernie Baeaufort. „Vote en ligne pour les initiatives de terrain en Californie : Collecte de signatures électroniques“. International Journal of Science and Society 4, Nr. 4 (18.10.2022): 75–83. http://dx.doi.org/10.54783/ijsoc.v4i4.555.
Der volle Inhalt der QuelleOuimet, Marc. „Réflexions sur Internet et les tendances de la criminalité“. Criminologie 39, Nr. 1 (26.06.2006): 7–21. http://dx.doi.org/10.7202/013123ar.
Der volle Inhalt der QuelleBryce, George K., und Pran Manga. „The Effectiveness of Health and Safety Committees“. Articles 40, Nr. 2 (12.04.2005): 257–83. http://dx.doi.org/10.7202/050133ar.
Der volle Inhalt der QuelleVallet, Caroline. „La cyberpédopornographie : au centre des débats“. Chronique de législation 40, Nr. 2 (17.10.2014): 599–615. http://dx.doi.org/10.7202/1026961ar.
Der volle Inhalt der QuelleDissertationen zum Thema "Sécurité Internet"
Jacquin, Ludovic. „Compromis performance/sécurité des passerelles très haut débit pour Internet“. Phd thesis, Université de Grenoble, 2013. http://tel.archives-ouvertes.fr/tel-00911075.
Der volle Inhalt der QuelleAissaoui, Mehrez Hassane. „Sécurité pour les réseaux du futur : gestion sécurisée des identités“. Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066606.
Der volle Inhalt der QuelleToday, the Internet is changing radically our habits, especially with the massive influx of the nomadic techniques, the Internet of objects, the growing use of grid computing, wireless networks and the emergence of new approaches in recent years. In particular, the virtualization of the computing infrastructures, which allowed defining a new model called Cloud Computing, introducing an enough frank breakdown with the traditional models, can be perceived as a preparatory stage towards the Internet of future.The implementation of these approaches allows, in a different way : mutualization and organization of the computer system. It allows to dematerialize the physical infrastructures and to deport applications on distant containers. Therefore, the global architecture of Internet should be evolved. It will rely strongly on these new approaches and in particular, Cloud Computing and virtualization. However, no system is infallible especially if resources are distributed and mutualized. They raise a number of problems and involve directly security issues, which remain one of the main barriers to the adoption of these technologies.Like any new technology, Cloud Computing and virtualization create new risks, which come to graft to traditional threats of the outsourcing management of the privilege separation, the identity and accesses management, the robustness of the virtualization software, the virtual machine isolation, the personal data protection, reversibility, privacy... The traditional Internet architecture cannot provide the adequate solutions to the challenges raised by these new approaches: mobility, flexibility, security requirements, reliability and robustness. Thus, a research project (SecFuNet : Security For Future Networks) was validated by the European Commission, to provide some answers, to make a state of the art of these security mechanisms and a comprehensive study of orchestration and integration techniques based on protection components within overall security architecture
Aissaoui, Mehrez Hassane. „Sécurité pour les réseaux du futur : gestion sécurisée des identités“. Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066606.
Der volle Inhalt der QuelleToday, the Internet is changing radically our habits, especially with the massive influx of the nomadic techniques, the Internet of objects, the growing use of grid computing, wireless networks and the emergence of new approaches in recent years. In particular, the virtualization of the computing infrastructures, which allowed defining a new model called Cloud Computing, introducing an enough frank breakdown with the traditional models, can be perceived as a preparatory stage towards the Internet of future.The implementation of these approaches allows, in a different way : mutualization and organization of the computer system. It allows to dematerialize the physical infrastructures and to deport applications on distant containers. Therefore, the global architecture of Internet should be evolved. It will rely strongly on these new approaches and in particular, Cloud Computing and virtualization. However, no system is infallible especially if resources are distributed and mutualized. They raise a number of problems and involve directly security issues, which remain one of the main barriers to the adoption of these technologies.Like any new technology, Cloud Computing and virtualization create new risks, which come to graft to traditional threats of the outsourcing management of the privilege separation, the identity and accesses management, the robustness of the virtualization software, the virtual machine isolation, the personal data protection, reversibility, privacy... The traditional Internet architecture cannot provide the adequate solutions to the challenges raised by these new approaches: mobility, flexibility, security requirements, reliability and robustness. Thus, a research project (SecFuNet : Security For Future Networks) was validated by the European Commission, to provide some answers, to make a state of the art of these security mechanisms and a comprehensive study of orchestration and integration techniques based on protection components within overall security architecture
Mouelhi, Tejeddine. „Modélisation et test de mécanismes de sécurité dans des applications internet“. Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-00544431.
Der volle Inhalt der QuelleClaeys, Timothy. „Sécurité pour l'internet des objets : une approche des bas en haut pour un internet des objets sécurisé et normalisé“. Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAM062.
Der volle Inhalt der QuelleThe rapid expansion of the IoT has unleashed a tidal wave of cheap Internet-connected hardware. Formany of these products, security was merely an afterthought. Due to their advanced sensing and actuatingfunctionalities, poorly-secured IoT devices endanger the privacy and safety of their users.While the IoT contains hardware with varying capabilities, in this work, we primarily focus on the constrainedIoT. The restrictions on energy, computational power, and memory limit not only the processingcapabilities of the devices but also their capacity to protect their data and users from attacks. To secure theIoT, we need several building blocks. We structure them in a bottom-up fashion where each block providessecurity services to the next one.The first cornerstone of the secure IoT relies on hardware-enforced mechanisms. Various security features,such as secure boot, remote attestation, and over-the-air updates, rely heavily on its support. Sincehardware security is often expensive and cannot be applied to legacy systems, we alternatively discusssoftware-only attestation. It provides a trust anchor to remote systems that lack hardware support. In thesetting of remote attestation, device identification is paramount. Hence, we dedicated a part of this work tothe study of physical device identifiers and their reliability.The IoT hardware also frequently provides support for the second building block: cryptography. Itis used abundantly by all the other security mechanisms, and recently much research has focussed onlightweight cryptographic algorithms. We studied the performance of the recent lightweight cryptographicalgorithms on constrained hardware.A third core element for the security of the IoT is the capacity of its networking stack to protect the communications.We demonstrate that several optimization techniques expose vulnerabilities. For example,we show how to set up a covert channel by exploiting the tolerance of the Bluetooth LE protocol towardsthe naturally occurring clock drift. It is also possible to mount a denial-of-service attack that leverages theexpensive network join phase. As a defense, we designed an algorithm that almost completely alleviates theoverhead of network joining.The last building block we consider is security architectures for the IoT. They guide the secure integrationof the IoT with the traditional Internet. We studied the IETF proposal concerning the constrainedauthentication and authorization framework, and we propose two adaptations that aim to improve its security.Finally, the deployment of the IETF architecture heavily depends on the security of the underlying communicationprotocols. In the future, the IoT will mainly use the object security paradigm to secure datain flight. However, until these protocols are widely supported, many IoT products will rely on traditionalsecurity protocols, i.e., TLS and DTLS. For this reason, we conducted a performance study of the most criticalpart of the protocols: the handshake phase. We conclude that while the DTLS handshake uses fewerpackets to establish the shared secret, TLS outperforms DTLS in lossy networks
Saleh, Hayder. „Une architecture novatrice de sécurité à base de carte à puce Internet“. Versailles-St Quentin en Yvelines, 2002. http://www.theses.fr/2002VERSA009.
Der volle Inhalt der QuelleBachy, Yann. „Sécurité des équipements grand public connectés à Internet : évaluation des liens de communication“. Thesis, Toulouse, INSA, 2015. http://www.theses.fr/2015ISAT0014/document.
Der volle Inhalt der QuelleToday, equipment embedding software and an Internet connection are more and more numerous and various. With the emergence of “the internet of things” and the trend to interconnect everything, many equipment used in our every day life are now connected to the internet: Smart-Tvs, DVD players, alarm and home automation systems, and even health assistance home devices, for example. Unfortunately, these technological evolutions also introduce new security threats. The massive use of internet facilitates the propagation of malware, capable of targeting any computer device, and more specifically any internet connected device. Although several methods allowing security analysis of industrial systems exist, their application to home devices is still limited. The existence and the criticality of potential vulnerabilities in these devices are not well-known, because they have not been thoroughly studied. This is precisely the objective of this thesis, which presents a method allowing to carry out a vulnerability analysis of internet connected home devices. This method is composed of two main phases: a risk analysis phasefollowed by an experimental phase. The security analysis of any type of equipement, requires a good knowledge ofits environment. In order to guide the evaluator in this task, we propose, as a first step, to rely on existing risk analysis methods. These methods are now mature, and allow the evaluator to obtain a global view of the risks incurred by the usage of anequipment. Then, during the second step of our method, the evaluator concentrates on the most important risks in order to demonstrate the technical feasibility of the scenarios leading to the considered risks, by carrying out several experiments.Considering the large amount and the diversity of I/Os on connected devices, it is important to focus on specifically rich attack scenarios, possibly depending on a simple local vulnerability. For this second step, an experimental method is proposedin order to study these attack scenarios, which, moreover, target equipement whose specifications are not necessarily available.In order to illustrate the entire method, this thesis presents two case studies: Integrated Access Devices and Smart-Tvs. These studies are carried out on a panel of devices from major internet service providers and TV manufacturers, allowing us to compare several devices available on the market. The vulnerabilities pointed out, mainly concern the communication means (local loop for the IAD, DVB-T interface for the smart-TVs) connecting these devices to their service providers (ISP for the IAD, TV and VoD for the smart-TVs). These communication links are usually considered safe, and have been, to our knowledge, seldom explored. Thisthesis thereby contributes to the security analysis of these particular communication means for connected devices and points out some original attack paths. Finally, this thesis ends by presenting different existing security mechanisms that can be used to avoid exploitation of the identified weaknesses
Vu, Van-Hoan. „Infrastructure de gestion de la confiance sur internet“. Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2010. http://tel.archives-ouvertes.fr/tel-00611839.
Der volle Inhalt der QuelleGuillet, Thomas. „Sécurité de la téléphonie sur IP“. Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00559130.
Der volle Inhalt der QuelleGuillet, Thomas. „Sécurité de la téléphonie sur IP“. Phd thesis, Paris, Télécom ParisTech, 2010. https://pastel.hal.science/pastel-00559130.
Der volle Inhalt der QuelleThis work focuses on the security of telephony networks deployed in the Internet. Without any doubt after the Web and messaging application, this service will impose IP (Internet Protocol) infrastructures like the standard for all types of information or media. Initially, we look for opportunities to strengthen the security of SIP (Session Initiation Protocol) IETF protocol currently massively adopted in the telephony infrastructure. We propose and validate innovative solutions to strengthen existing mechanisms in a completely transparent way for infrastructures. We choose to focus on authentication, because it is the first mechanism encountered by users or systems. The solutions presented below propose new security properties by defining a semantic field called "opaque". In a second step, we are interested in security solutions for end-to-end calls. Analysis of application solutions as “Future Narrow Band Digital Terminal” and “Simple Secure Voice over IP protocol“ allows us to formalize the specification of an architecture to protect conversations whatever the specificities and heterogeneity of networks ToIP are. Finally, the conclusion takes over and takes positions on the various contributions to this work in the context of IP telephony. Our will to be interoperable with the underlying or independent infrastructure can be considered as a value added service
Bücher zum Thema "Sécurité Internet"
Ghernaouti-Hélie, Solange. Internet et sécurité. Paris: Presses universitaires de France, 2002.
Den vollen Inhalt der Quelle findenPiette-Coudol, Thierry. Les objets connectés: Sécurité juridique et technique. Paris: Lexis Nexis, 2015.
Den vollen Inhalt der Quelle findenSimon, Cooper, und Chapman D. Brent, Hrsg. Building Internet Firewalls: Internet and Web security. 2. Aufl. Beijing: O'Reilly, 2000.
Den vollen Inhalt der Quelle findenBloch, Laurent. Sécurité informatique: Principes et méthode. Paris: Eyrolles, 2007.
Den vollen Inhalt der Quelle findenChapman, D. Brent. Building Internet firewalls. Cambridge, MA: O'Reilly & Associates, 1995.
Den vollen Inhalt der Quelle findenD, Zwicky Elizabeth, Hrsg. Building Internet Firewalls. Sebastopol, CA: O'Reilly & Associates, 1995.
Den vollen Inhalt der Quelle findenOppliger, Rolf. Internet and Intranet security. Boston: Artech House, 1998.
Den vollen Inhalt der Quelle findenInternet and Intranet security. 2. Aufl. Boston, MA: Artech House, 2002.
Den vollen Inhalt der Quelle finden1974-, Lacour Stéphanie, Asphalès (Research program) und Centre national de la recherche scientifique (France), Hrsg. La sécurité aujourd'hui dans la société de l'information. Paris: Harmattan, 2007.
Den vollen Inhalt der Quelle finden1974-, Lacour Stéphanie, Asphalès (Research program) und Centre national de la recherche scientifique (France), Hrsg. La sécurité aujourd'hui dans la société de l'information. Paris: Harmattan, 2007.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Sécurité Internet"
KHALIL, Ahmad, Nader MBAREK und Olivier TOGNI. „Adaptation du contrôle d’accès pour la sécurité de l’IoT“. In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 169–204. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch7.
Der volle Inhalt der QuelleAL AGHA, Khaldoun, Pauline LOYGUE und Guy PUJOLLE. „Internet des Edges : la virtualisation“. In Edge Networking, 157–78. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9068.ch8.
Der volle Inhalt der QuelleAL AGHA, Khaldoun, Pauline LOYGUE und Guy PUJOLLE. „Le déploiement de l’Internet participatif“. In Edge Networking, 221–39. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9068.ch11.
Der volle Inhalt der QuelleWalczack, Cathy, und Serge Keroullé. „9 Le MASE : Manuel Amélioration Sécurité Entreprises“. In La sous-traitance interne, 241–56. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7-011.
Der volle Inhalt der QuelleWalczack, Cathy, und Serge Keroullé. „9 Le MASE : Manuel Amélioration Sécurité Entreprises“. In La sous-traitance interne, 241–56. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7.c011.
Der volle Inhalt der QuelleMoinet, Nicolas, und Guilhem Armanet. „Outil 28. La communication interne“. In La boîte à outils de la sécurité économique, 92–93. Dunod, 2015. http://dx.doi.org/10.3917/dunod.moine.2015.01.0092.
Der volle Inhalt der QuelleAgut, Gérard, und Alain Colman. „14 La politique hygiène et sécurité d’une PME de mécanique industrielle“. In La sous-traitance interne, 296–303. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7-016.
Der volle Inhalt der QuelleAgut, Gérard, und Alain Colman. „14 La politique hygiène et sécurité d’une PME de mécanique industrielle“. In La sous-traitance interne, 296–303. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7.c016.
Der volle Inhalt der QuelleDuchêne, François. „12 Formations externes à la sécurité pour les établissements classés Seveso, un dispositif sous pression1“. In La sous-traitance interne, 272–86. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7-014.
Der volle Inhalt der QuelleDuchêne, François. „12 Formations externes à la sécurité pour les établissements classés Seveso, un dispositif sous pression1“. In La sous-traitance interne, 272–86. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7.c014.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Sécurité Internet"
Rodríguez González, Sylvia Cristina. „Megadesarrollos turísticos de sol y playa enclaves del imaginario“. In International Conference Virtual City and Territory. Barcelona: Centre de Política de Sòl i Valoracions, 2009. http://dx.doi.org/10.5821/ctv.7522.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Sécurité Internet"
Marsden, Eric. Partage des modèles de sécurité entre donneurs d’ordres et entreprises intervenantes. Fondation pour une culture de sécurité industrielle, Dezember 2018. http://dx.doi.org/10.57071/360upb.
Der volle Inhalt der QuelleGautrais, Vincent, und Nicolas Aubin. Modèle d'évaluation des facteurs relatifs à la circulation des données: Instrument de protection de la vie privée et des droits et libertés dans le développement et l’usage de l’intelligence artificielle. Observatoire international sur les impacts sociétaux de l'IA et du numérique, März 2022. http://dx.doi.org/10.61737/rrlb1735.
Der volle Inhalt der QuelleFlandin, Simon, Germain Poizat und Romuald Perinet. Proactivité et réactivité: deux orientations pour concevoir des dispositifs visant le développement de la sécurité industrielle par la formation. Fondation pour une culture de sécurité industrielle, Februar 2021. http://dx.doi.org/10.57071/948rpn.
Der volle Inhalt der QuelleMbaye, Safiétou, Rémi Kouabenan und Philippe Sarnin. L'explication naïve et la perception des risques comme des voies pour améliorer les pratiques de REX: des études dans l'industrie chimique et l'industrie nucléaire. Fondation pour une culture de sécurité industrielle, September 2009. http://dx.doi.org/10.57071/311rex.
Der volle Inhalt der QuelleFICHE D’INFORMATION : D’auto-défenseurs à justiciers : un cadre typologique pour les groupes armés communautaires. RESOLVE Network, Dezember 2020. http://dx.doi.org/10.37805/fs2020.6.cbags.fr.
Der volle Inhalt der Quelle