Dissertationen zum Thema „Vie privée via le numérique“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Vie privée via le numérique" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Alamelou, Quentin. „Protocoles cryptographiques pour l’authentification numérique et le respect de la vie privée“. Thesis, Limoges, 2017. http://www.theses.fr/2017LIMO0042/document.
Der volle Inhalt der QuelleInternet constant growth has naturally led to cryptographic issues such as authentication and privacy concerns. The common usage of connected devices (smartphones, tablet, watch, …) as authentication means made us consider cryptographic keys generations and/or managements from such devices to address aforementioned needs. For such a purpose, we identified fuzzy extractors and group signature schemes. On the one hand, this thesis then presents the first reusable fuzzy extractor based on set difference metric (in the nonprogrammable random oracle). In so doing, we were able to design a key generation module performing authentication from users’ devices. On the other hand, we came up with two group signature schemes, respectively based on Hamming and rank metrics, that seriously compete with post-quantum concurrent schemes based on lattices
Savoie, Patrick. „Une criminologie pragmatique de la vie privée : articulations d'hybrides dans un espace numérique relationnel“. Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/38244.
Der volle Inhalt der QuelleRey, Bénédicte. „La privacy à l'ère du numérique : une gestion par les tensions“. Paris 5, 2009. http://www.theses.fr/2009PA05H063.
Der volle Inhalt der QuelleThe massive diffusion of information technology and of the Internet, of the mobile phone and of other communicating technologies produce lots of digital traces which keep the memory of people's acts. Some see in these changes the opportunity to increase security, Customer relationship management or comfort in everyday life. But some other fear the advent of a surveillance society in which privacy would erode. We examine here what privacy in the digital age means, and how the technological changes, but also services and uses changes unhinge the traditional privacy acceptation based on norms. Privacy problems predate the digital era. But somme changes nowadays harden privacy problems and call into question the way these problems are responded to. The wide scope of digital information and its accessibility affects privacy risks, which become difficult to pre-empt. Crises analysis shows that privacy reflexion shall from now on go in for complementary ways that should be easygoing for people to use them
Vincent, Johann. „Identité numérique en contexte Télécom“. Phd thesis, Université de Caen, 2013. http://tel.archives-ouvertes.fr/tel-01007682.
Der volle Inhalt der QuelleHasan, Omar. „Privacy preserving reputation systems for decentralized environments“. Lyon, INSA, 2010. http://theses.insa-lyon.fr/publication/2010ISAL0066/these.pdf.
Der volle Inhalt der QuelleIl a été observé que les utilisateurs d'un système de réputation hésitent souvent à fournir un feedback négatif en raison de la crainte de représailles. Une solution à ce problème est la mise en œuvre de systèmes de réputation préservant la vie privée i. E. , calculant la réputation de telle sorte que le feedback individuel de chaque utilisateur ne soit pas révélé. Dans cette thèse, nous présentons des protocoles de réputation préservant la vie privée qui sont décentralisés, ne nécessitent pas de plates-formes spécialisées ni de tiers de confiance, qui protègent la vie privée sous une gamme de modèles de sécurité (" semi-honest ", " non-disruptive malicious ", " disruptive malicious ") et sont plus efficaces que les protocoles comparables (le protocole le plus coûteux nécessite O(n) + O(log N) messages, où n est le nombre d'utilisateurs qui fournissent un feedback et N est le nombre total d'utilisateurs). Les techniques que nous utilisons comprennent la trust awareness, la perturbation des données, le partage de secret, les techniques de calcul sécurisé multi-parties, les cryptosystèmes additifs homomorphiques, et les preuves de " zéro-connaissance ". Enfin, nous examinons certains problèmes liés aux techniques de recommandation et de propagation de la confiance. Nous proposons une solution au problème de la subjectivité intrinsèque à la notion de confiance. Les résultats expérimentaux obtenus confirment la pertinence de la stratégie proposée
Balgobin, Yann. „Contribution à l'économie de la vie privée et des données financières“. Electronic Thesis or Diss., Paris, ENST, 2018. http://www.theses.fr/2018ENST0038.
Der volle Inhalt der QuelleThis thesis investigates the economic consequences of consumers’ control over the level of personal information they are willing to share with firms. This subject is vital for the digital economy as many firms collect and use information about consumers to increase their revenues. Firms may face greater difficulty to generate profit from personal data. Firstly, because consumers are increasingly concerned about their privacy. Secondly, because more and more privacy-enhancing technologies (PETs) become available. We find in the thesis that the use of PETs could positively influence consumers’ willingness to share personal information, enabling a data collection that takes privacy concerns into account. We make similar conclusions in the case of financial information. Developing the use of non-bank payment instruments (and thus allowing consumers to hide some information to banks) could benefit e-commerce, leading consumers to buy more online. Finally, in a context where consumers are concerned with their privacy, banks may benefit from making screening less intrusive, as it would improve their lending strategy
Aguilar, Melchor Carlos. „Les communications anonymes à faible latence“. Toulouse, INSA, 2006. http://www.theses.fr/2006ISAT0021.
Der volle Inhalt der QuelleIn this thesis, we present different systems providing low-latency anonymous communications. We first study the performance of systems based on well known primitives such as superposed sending and encrypted padding for transmission, and broadcast with implicit addressing for reception, when the group of potential users is restricted to be small, closed, or localized. We propose the usage of Private Information Retrieval (PIR) protocols as an alternative to broadcast with implicit addressing, and we study the resulting systems. These systems allow us to trade communication cost, for computational cost. Through some examples, we show that the new solutions offer a better choice in some situations, specially when the users are connected to the service through the Internet. Then, we put forward how the different approaches are related, and show that the systems based on classic primitives are in fact just some instances of a family, which becomes much larger and versatile through the introduction of PIR protocols
Fragoso, Rodriguez Uciel. „Modèle de respect de la vie privée dans une architecture d'identité fédérée“. Phd thesis, Institut National des Télécommunications, 2009. http://tel.archives-ouvertes.fr/tel-00541850.
Der volle Inhalt der QuellePayraudeau, Christel. „La protection du droit au respect de la vie privée par le Conseil constitutionnel à l’épreuve du numérique“. Thesis, Corte, 2022. http://www.theses.fr/2022CORT0006.
Der volle Inhalt der QuelleThe constitutionalisation of the right to privacy has progressively found its place, but with the advent of digital technology, new issues have emerged. Our society has undergone major changes over the last few decades, and even though modern technologies are very attractive due to their undeniable efficiency, they are evolving very fast and the law can thus only intervene too late.In this context and with regard to the supremacy of digital technology, we must question the reality of individual freedoms and fundamental rights. Privacy is shaken up by new practices. These issues are inescapable whatever the global challenges be they security, economic or political ones. It is necessary to analyse how the constitutional Council positions itself in order to better identify its limits. In our digital age, how can the much needed protection of the constitutional Council appear as inadequate as regards the right to privacy ?The purpose of this thesis is to demonstrate that in an ever-evolving technological world, the three themes studied here are inextricably linked: the right to privacy, as with individual freedoms which prevail, digital technology which makes itself indispensable and the constitutional court to guarantee the proper functioning and the management of these notions which could easily become antagonistic. We will identify the constitutional objectives which can be opposed to the right to privacy as well as the guarantees which determine the conciliation of this right with legislative objectives. In our study, we will consider that privacy in the digital virtual world has two sides that the constitutional Council is attempting to guarantee: on the one hand, protecting our relationship with others and on the other hand protecting the individual.It is important to remain critical of the use made of our personal data. With digital technology, the protection of privacy must unquestionably be analysed beyond our national borders. To analyse the dangers which threatens it, it is interesting to look at the study of the constitutional Council decisions in order to be able to compare case law and French legislation to those of other countries. Digital tools, due to their possible impacts on many aspects of our lives, considerably reduce spatial and temporal boundaries, which increasingly appear as obsolete. The digital network can virtually connect people all over the world. Therefore, constitutional protection is today part of a very different context insofar as exercising our freedoms and rights, such as privacy, inevitably has a supranational dimension
Pierre, Julien19. „Le cadre privatif : des données aux contextes : approche interdimensionnelle des enjeux de médiation de la vie privée“. Thesis, Grenoble, 2013. http://www.theses.fr/2013GRENL002.
Der volle Inhalt der QuelleWe build an analysis of contemporary identity devices (including social network sites) on several levels: computer (conceptual model ending social representations and sociability), microsocial (negotiating subjective singularities and anchoring social norms), economics (hegemonic strategies and partnerships with cultural industries), socio-political (experimenting individual postures based on emotional experiences in a « private club model » and making it possible to engage in deliberative processes constituting common sense). To understand these issues, we have implemented an immersive and multi-situated methodology located in a population composed of contemporary subject's figures: young apprentices in the Tertiary, subject to complex constraints, and committed personal level, social and professional identity in various devices. It is clear from these analyzes several theoretical proposals, including the « privatory framework » presented as a set of identity constraints defined or negotiated by interactants and situating in Computer Science (engineering publicized privacy), the micro (mutual insight), economic (socioeconomic model of the « private club »), socio-political (anecdotical sphere) and methodological (immersion to users)
Lajoie-Mazenc, Paul. „Réputation et respect de la vie privée dans les réseaux dynamiques auto-organisés“. Thesis, Rennes 1, 2015. http://www.theses.fr/2015REN1S039/document.
Der volle Inhalt der QuelleReputation mechanisms are very powerful mechanisms to foster trust between unknown users, by rewarding good behaviors and punishing bad ones. Reputation mechanisms must guarantee that the computed reputation scores are precise and robust against attacks; to guarantee such properties, existing mechanisms require information that jeopardize users' privacy: for instance, clients' interactions might be tracked. Privacy-preserving reputation mechanisms have thus been proposed, protecting both clients' privacy and the providers' one. However, to guarantee strong privacy properties, these mechanisms provide imprecise reputation scores, particularly by preventing clients to testify about their negative interactions. In this thesis, we propose a new distributed privacy-preserving reputation mechanism allowing clients to issue positive as well as negative feedback. Such a construction is made possible thanks to tools from the distributed systems community -- distributed third parties that allow for a distribution of trust and that tolerate malicious behaviors -- as well as from the cryptographic one -- for instance zero-knowledge proofs of knowledge or anonymous proxy signatures. Furthermore, we prove that our mechanism guarantees the required privacy and security properties, and we show with theoretical and practical analysis that this mechanism is usable
Marsollier, Claire. „Le droit à l'oubli numérique : approche comparative franco-canadienne“. Master's thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/67322.
Der volle Inhalt der QuelleLa démocratisation d’Internet a entraîné une massification des données. Ce nouvel or noir se retrouve stocké pour une durée infinie, car Internet n’oublie pas. Tout cela vint bouleverser les aptitudes humaines à oublier, la mémoire inaltérable d’Internet est venue se substituer à la mémoire humaine. Cela soulève un grand nombre de difficultés s’agissant en particulier d’enjeux réputationnels. Ainsi, face à cette hypermnésie, intervient la question du droit à l’oubli numérique. L’objectif de ce travail de recherche est d’étudier la place de ce droit à être oublié en France et au Canada. Ce droit, très controversé, peine à se faire accepter. Si cette prérogative a été consacrée sur le Vieux Continent, son émergence au Canada est mise à mal par la large place laissée à la liberté d’expression. Très vite, s’érige autour du droit à l’oubli ce qui pourrait s’apparenter à des limites. Il s’agit notamment de sa portée territoriale, mais également de son articulation avec les autres droits. Ce travail de recherche démontrera qu’il ne s’agit pas tant de limites que d’éléments venant renforcer sa légitimité. Enfin, de ce travail de recherche ressort que le droit à l’oubli numérique met en évidence les dangers actuels de la tendance à la privatisation de la justice.
Perbal, Bernard. „Les données personnelles et la propriété du soi“. Thesis, Université Côte d'Azur (ComUE), 2018. http://www.theses.fr/2018AZUR0024.
Der volle Inhalt der QuelleThe dazzling growth of biological sciences, whose societal impacts might not have been well enough anticipated by the international law, has created conceptual conflicts that should be apprehended in constructive debates, respectful of the richness of individual differences, so as to avoid any ideological compartmentalization, which will be of no benefit to Humanity. The analysis of the roots of the concept of personal data and of the evolution of its acceptance, sends back to the very long and difficult journey from the very first European founding texts to the consecration of the right to privacy rooted in the obstinacy of its two defenders SW and LB whose seminal works have impacted international law as a whole. Personal information identified as data, has become coveted resources by the worlds of economy, electronic business, biomedicine and criminology. The dematerialization of individual characteristics brought with it an immense wave of issues and conflicts in relation with procedures of collection, processing, circulation and confidentiality of this type of data, especially when it dealt with sensitive identifiers such as genetic data. Technically unattainable until now, the secrets of life and heredity are currently being offered to the general public, who often finds itself powerless when facing companies willing to exploit the richness of their intimate self. The newly revealed potentialities of human genetic engineering, has put forth the weakness and inefficiencies of outdated legal and normative texts which, because of their inadequacy to societal evolution, lead to rigid divisions of principles before genetic technologies who aspire to take advantage of the understanding of genomes in order to improve the well being of people. It is necessary, today, to remove any passionate feeling to temper emotional debates by redefining, as soon as possible, the legal status of genetic data and the information that their exploitation can deliver
Orsi, Livio. „Le droit constitutionnel à la libre communication numérique : (Vers un renouveau constitutionnel en faveur de la constitutionnalisation des droits du numérique)“. Electronic Thesis or Diss., Toulon, 2020. http://www.theses.fr/2020TOUL0131.
Der volle Inhalt der QuelleInternet and digital communication have modernized and amplified many practices related to the democracy. The constitutional right of freedom of expression and communication of thoughts and opinions has several democratic and fundamental roles in society. The right to Internet access can be described as a fundamental and functional right in order to be able to exercise other fundamental rights. Digital technology makes it possible to strengthen the legitimacy of representative and participative democracy. However, it is necessary to be able to reconcile it in the best way with the requirement of fighting offenses on the Internet. Technological developments have changed state activities. In the digital age, there is a lack of constitutional provisions that protect fundamental rights and freedoms against state surveillance activities. One of the interests of the constitutionalization of the digital rights principles is to give the Constitutional Council the tools to control the constitutionality of the new laws, especially with the renewal of textual standards of constitutional reference necessary to monitor the constitutional compliance of laws of the 21st century and to improve the codification of a lot of new digital rights
Harivel, Jean. „Libertés publiques, libertés individuelles, risques et enjeux de la société numérique“. Thesis, Paris 1, 2018. http://www.theses.fr/2018PA01D024/document.
Der volle Inhalt der QuelleThe invasion of digital technology has changed civil and administrative society since the end of the 20th century. Public and individual freedoms have been affected by this information technology. Common law has adapted to defend public liberties. Special legislation has been put in place to protect privacy through the protection of personal data. Mercantile companies collect these data and exchange them. They thus constitute a database containing a mass of information concerning each individual. The government adapts laws to allow surveillance of individuals to fight against terrorism. But technology also allows the dissemination of administrative data to citizens and promotes neutral information. This information paves the way for citizen participation. Since France refuses to introduce the protection of privacy directly into the Constitution, the European courts, ECHR and CJEU, have in recent years effectively protected this private life. This protection is also based on better training of individuals in the face of the dangers of social networks and the Internet, training that remains to be developed
Barki, Amira. „Mécanismes cryptographiques conciliant authentification et respect de la vie privée dans le contexte du M2M“. Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2337.
Der volle Inhalt der QuelleMachine to Machine (M2M) applications enable a better management of resources and provide users With greater cornfort. Unfortunately, they also entail serious security and privacy concerns. ln this thesis, we focus on M2M security, and particularly on the authentication and privacy issues of M2M applications involving a SIM card. ln the first part, we design five new cryptographic primitives and formally prove that they meet the expected security requirements. More precisely, they consist of a partially blind signature scheme, a sequential aggregate Message Authentication Codes (MAC) scheme, an algebraic MAC scheme and two pre-Direct Anonymous Attestation (pre-DAA) schemes. Some of the proposed schemes aim to achieve a particular property that was not provided by previous constructions whereas others intend to improve the efficiency of state-of-the-art schemes. Our five schemes do not require the userls device to compute pairings. Thus, they are suitable for resource constrained environments such as SIM cards. ln a second part, we rely on these primitives to propose new privacy-preserving protocols. More specifically, we design an efficient private eCash system. We also propose a protocol enabling anonymous authentication and identification of embedded SIMs (eSlMs). Furthermore, we rely on our algebraic MAC scheme to build a practical Keyed-Verification Anonymous Credentials (KVAC) system. Finally, based on our sequential aggregate MAC scheme, we introduce a remote electronic voting system that is coercion-resistant and practical for real polls. The security of our protocols is formally proven in the Random Oracle Model (ROM) under classical computational assumptions
Rossi, Julien. „Protection des données personnelles et droit à la vie privée : enquête sur la notion controversée de « donnée à caractère personnel »“. Thesis, Compiègne, 2020. http://www.theses.fr/2020COMP2549.
Der volle Inhalt der QuelleInternet and digital information and communication technologies in general are often portrayedas a threat to privacy. This gives rise to many debates, both in the media and among decisionmakers. The Snowden revelations, in 2013, followed by the adoption in 2016 of the General Data Protection Regulation (GDPR), have moved these discussions under the spotlight of the publicsphere.The research presented in this dissertation was born out of three questions: can we define what“privacy” is? Is there any consensus on its definition? And does this consensus change with theevolution of the technical milieu transforming our ways of communicating, and by doing so, theway in which our privacy can be intruded upon? By defining “privacy” as the object which is protected by normative texts – laws, court decisions,techno-political standards of the Internet – protecting the right to privacy, it becomes possible toconduct an empirical study of how it evolved and how it has been a topic of contention. Data protection law emerged in Europe during the 1970’s. Its aim was to protect a “privacy” that was perceived as under threat by the advent of computers. Currently, the GDPR, or somedocuments adopted by standards-settings organisations like the Internet Engineering Task Force(IETF) or the World Wide Web Consortium (W3C), are written with the intention that they protect this privacy through a set of rules and principles referred to as “data protection”, that apply to “personal data”. The legal definitions of this notion produced by political institutions and those crafted instandards-settings bodies are identical. Furthermore, the study of the genealogy of data protection reveals that computer scientists have played a pivotal role in the invention of the principles that “data protection” still relies on, for instance in the GDPR. The analysis of the controversies that took place in the shaping of these rules shows that the notion of “personal data” written down in the normative texts we analysed essentially reflects the beliefs system of a coalition inspired by liberal utilitarian ideals, valuing individual autonomy and granting importance to the respect of one’s consent. This framing of “privacy” has become the paradigm on the field. Other theories, such as those defining “privacy” as a space bound by collectively defined borders protecting it from the public eye, or those advocating the recognition of private property rights on personal data, have been less successful in shaping policy out comes.The advent and spread of networked computers have not directly determined the evolution of theobject that is protected by the right to privacy. It is, rather, the perceptions a group of actors had of computers, that caused such an evolution. Convinced that their liberal conception of privacy issocially valuable, they managed to craft a new legal category during the 1970’s in Europe: the right to the protection of personal data. The GDPR, adopted in 2016, just like Web standards aiming at enhancing the protection of privacy, rely those same principles that were invented during these early debates. Therefore, it can be said that the emergence of computers has indeed, but indirectly, been a triggering factor in the evolution of “privacy” defined as the object protected by the right to privacy
Lefrere, Vincent. „Market of personal data and regulation“. Thesis, université Paris-Saclay, 2020. http://www.theses.fr/2020UPASE005.
Der volle Inhalt der QuelleContent processing algorithms used in the Internet industry are essential to the functioning of many services. They serve to filter content, order responses to a search, select relevant information, make recommendations. They have become necessary for the analysis of the large masses of data from connected objects and e-commerce. These tools are also generators of innovation in service in a strategic and highly competitive economic sector. The literature on law and economics shows ambivalent results related to economics impact of algorithms. On the one hand, this literature shows that the algorithms raise questions (abuse) of dominance, collusion and discrimination. Chen et al. (2017) study the UBER platform and show that there is an algorithmic monopoly on Uber, where the price varies according to algorithm-specific rules and not according to a market logic in which supply and demand determine equilibrium price. In the case of oligopoly, Mehra (2016), Ezrachi and Stucke (2015) have shown the existence of collusion (via price parallelism) due to the presence of robo-sellers who coordinate prices according to an upward trend. Finally, Mikians et al. (2013); Hannak et al. (2014) show the existence of numerous form of price discrimination in different sectors. Datta et al. (2015) ; Lambrecht and Tucker, (2016) observe gender-based discrimination on the level of wages. On the other hand, the literature shows that algorithms can improve choices made by individuals, particularly in court decisions. While, the preconceived ideas of American judges towards African-American individuals induce a biased judicial decision, the implementation of algorithms has demonstrated a crime reduction of 24.8% (Kleinberg et al, 2016). A preliminary literature in economics and law attempts to assess the algorithm behaviors with the aim to identify the cause of information asymmetry in the market and thus between consumers - Regulator - and the firms. We aim to identify the implications for regulation of economics of privacy and the extent of obligation to protect the privacy of consumers? How can companies be more transparent and fair, given that an algorithm is the strategic resource of firms and a source of innovation and market power? How to avoid the dangers of an adverse selection mechanism (where the most respectful of personal data would be out of market) and moral hazard (due to too high regulatory oversight costs)? The thesis will work on all these points
Maifada, Magoudani Mahamadou. „Construire et mettre en œuvre un droit des données personnelles dans l’espace UEMOA : étude comparée à partir des cas du Burkina Faso, de la Côte d’Ivoire, du Niger et du Sénégal à la lumière du droit français et européen“. Electronic Thesis or Diss., Paris 12, 2023. http://www.theses.fr/2023PA120073.
Der volle Inhalt der QuelleThis thesis provides an in-depth analysis of the legal framework surrounding the protection of personal data within the West African Economic and Monetary Union (WAEMU), specifically focusing on Burkina Faso, Côte d'Ivoire, Niger, and Senegal – the areas under study. It delves into the motivations that led these states to adopt specific legislations influenced by foreign models, notably the French model of the "Loi Informatique et Libertés," rather than relying on national or community references.This analysis explores the development process of these regulations, from legislative evolution to international institutions' initiatives. Special attention is given to the influence of the International Organization of La Francophonie (IOF) and the French Commission for Data Protection (Commission de l'Informatique et des Libertés) in promoting the initial national legislations within this region.Furthermore, the thesis conducts a detailed comparison between the existing regulations within WAEMU and the European Union's General Data Protection Regulation (GDPR). This comparison highlights significant similarities and differences, particularly concerning the scope of application, stakeholders' responsibilities, and the rights of the individuals concerned.Moreover, the study examines the practical implementation of these regulations, focusing on key actors, including regulatory authorities, data controllers, Civil Society Organizations (CSOs), and data subjects in each state. It analyzes the challenges faced by regulatory authorities and cooperation policies aimed at enhancing the effectiveness of personal data rights.Finally, the thesis explores the limitations of personal data rights, particularly in their interaction with public policies in the telecommunications sector and the issues related to cybercrime.Overall, this work offers a comprehensive and nuanced perspective on personal data rights within WAEMU, shedding light on the motivations, achievements, challenges, and prospects in the ever-evolving African legal context. It constitutes a significant contribution to the understanding of personal data protection in the African legal context
El, jaouhari Saad. „A secure design of WoT services for smart cities“. Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0120/document.
Der volle Inhalt der QuelleThe richness and the versatility of WebRTC, a new peer-to-peer, real-time and browser based communication technology, allowed the imagination of new and innovative services. In this thesis, we analyzed the capabilities required to allow a participant in a WebRTC session to access the smart Things belonging to his own environment as well as those of any other participant in the same session. The access to such environment, which we call “SmartSpace (SS)”, can be either passive, for example by monitoring the contextual information provided by the sensors, or active by requesting the execution of commands by the actuators, or a mixture of both. This approach deserves attention because it allows solving in an original way various issues such as allowing experts to remotely exercise and provide their expertise and/or knowing how. From a technical point of view the issue is not trivial because it requires a smooth and mastered articulation between two different technologies: WebRTC and the Internet of Things (IoT) /Web of Things (WoT). Hence, the first part of the problem studied in this thesis, consists in analyzing the possibilities of extending WebRTC capabilities with theWoT. So as to provide a secure and privacy-respectful access to the various smart objects located in the immediate environment of a participant to any otherend-user involved in the same ongoing WebRTC session. This approach is then illustrated in the ehealth domain and tested in a real smart home (a typical example of a smart space). Moreover,positioning our approach in the context of communication services operating in smart cities requires the ability to support a multiplicity of SSs,each with its own network and security policy. Hence,in order to allow a participant to access one of his own SSs or one of another participant (through a delegation of access process), it becomes necessary to dynamically identify, select, deploy, and enforce the SS’s specific routing and security rules, so as to have an effective, fast and secure access. Therefore, the second part of the problem studied in this Ph.D.consists in defining an efficient management of the routing and security issues regarding the possibility of having multiple SSs distributed over the entire network
Nguyen, Nhu Ha. „Les enjeux juridiques des traitements de données : l'expérience vietnamienne“. Thesis, Toulouse 1, 2016. http://www.theses.fr/2016TOU10012.
Der volle Inhalt der QuelleFollowing the impressive development of networks, information technologies have entered the age of large volumes of data. The development of technology has created more and more databases and has allowed individuals to access it easily. Databases are essential tools in an economy founded on knowledge. The protection of investment in making databases is not harmonized internationally. Electronic networks such as the Internet, which represent a fantastic instrument of communication and sharing tool at the worldwide scale, sometimes lead to a violation of fundamental rights such as the right to privacy. Laws that protect personal data and privacy are still present almost everywhere in the world. However, in Vietnam, no specific law exists on the protection of personal information. The same lack appears for the protection of databases. Furthermore, although the world has been interested in Cloud Computing and Big Data for several years, Vietnam only began dealing with these subjects in 2008 for Cloud, and 2013 for Big Data. Due to its membership in the Trans-Pacific Partnership, laws to protect databases and personal data and the legal status of Cloud and Big Data, Vietnam will surely have to drastically change its legal system
Brenac, Marin. „La souveraineté numérique sur les données personnelles : étude du règlement européen no 2016/679 sur la protection des données personnelles à l'aune du concept émergent de souveraineté numérique“. Master's thesis, Université Laval, 2017. http://hdl.handle.net/20.500.11794/28306.
Der volle Inhalt der QuelleGoulvestre, Ann-maël. „La RFID et le droit“. Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM1016.
Der volle Inhalt der QuelleThe acronym RFID stands for Radio Frequency Identification, a wireless technology that provides the ability to automatically identify and locate tags attached to objects, as well as the person who is actually carrying them. The technology relies on storing and retrieving data, through radio waves by using devices called RFID tags. Those tags are already prevalent in our everyday lives to grant building access control for example. And this is only the beginning, as RFID technology is expected to be one of the main brick of the Internet of things. Like any other new technology, RFID needs a suitable legal framework to get benefits to both consumers and businesses. This work is thus intended to bring up RFID from a legal perspective. Indeed, one of the new technology key successes lies on the way the consumers will grasp it. When looking for economic profits, it is then essential to focus on public perception and consumer confidence related to this technology. And this would not come along without security concern which represents actually the main challenge to face, most of all from a technical perspective, but also from a legal one.For this reason, the proposed work aims at exposing the legal framework which could be applied both to its container (the RFID system) and its content (the RFID data). It is worth analysing the way the legal practitioner can deal with this technology and all its related issues. Are there any specifics legislations on this subject? And if so, what are they? A critical assessment is undertaken to appreciate the substance of the relationships existing between RFID and law, and potential improvement that come along
Mousa, Hayam Abdalla. „Management of selfish and malicious behaviors in distributed collaborative systems“. Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI036.
Der volle Inhalt der QuelleParticipatory sensing is an emerging paradigm in which citizens voluntarily use their mobile phones to capture and share sensed data from their surrounding environment in order to monitor and analyze some phenomenon. Various reputation systems have been proposed to monitor participants' behavior in participatory sensing applications in order to identify those who provide bad contributions. However, the existing reputation systems do not provide privacy guarantees to the contributors. Thus, users usually hesitate to join participatory sensing campaigns since they are asked to provide their sensed data including time, location, etc. It has been shown in different works that up to 95% of participants’ identities can be re-identified through sharing four contributions containing multi-sensor data. Due to this reason, the integration between privacy preserving systems and reputation systems is a crucial need for building secure and reliable participatory sensing applications. This integration requires the assurance of seemingly conflicting objectives. Indeed, reputation systems monitor participants’ behaviors along subsequent interactions. Whereas, the objective of privacy preserving systems is to in fact detach the link between subsequent interactions. In this thesis, we study possible strategies to integrate privacy preserving systems within reputation-aware systems. This integration raises a new privacy challenge because of the contradiction between their objectives. Then, a new attack has been defined (RR attack). RR attack exploits this contradiction in order to detect the succession of contributions provided by the same participant. Next, a new privacy preserving reputation-aware protocol (PrivaSense) is proposed. PrivaSense defines a method that ensures both privacy and reputation and simultaneously solves their contradiction. Finally, we propose a novel reputation system DTSRS, which depends on a set of the most trusted participants in order to assess the reputation of participants. DTSRS introduces new measures to evaluate the trust of participants' contributions. DTSRS has the ability to defend more strongly against a set of attacks that was not considered in the literature (e.g. Collision, On-off, etc.). DTSRS enables the application server to aggregate the data more accurately. Moreover, DTSRS assesses both trust and reputation correctly even if a large number of adversaries are included in the sensing campaign
Fernandez, Simon. „Le DNS comme Source de Confiance et d'Information pour l'Internet Moderne“. Electronic Thesis or Diss., Université Grenoble Alpes, 2023. http://www.theses.fr/2023GRALM074.
Der volle Inhalt der QuelleThe Domain Name System is a cornerstone of the modern Internet, providing information on millions of domainnames by answering billions of requests per day.It is often simplified as just a system mapping human-readable names to machine IP addresses, but it fillsmultiple other roles and many systems use its architecture, availability, and resilience as a foundation for theirdesign.The DNS is a hierarchical and distributed system, storing technical information on domain names, like their IPaddress allowing other devices on the network to contact them, or the name of the server in charge of their mail boxes.However, the DNS protocol was designed in the early 1980s, when the Internet was just a small set of interconnecteduniversities and government agencies.Therefore, hundreds of protocol extensions were added to its specifications to betteraddress the needs and paradigms of the growing and changing Internet.Thanks to its unique properties, many different systems rely on the domainname architecture and the DNS infrastructure, like mail delivery and security, load balancing, intrusion detectionsystems and service discovery.Malicious actors also leverage the DNS architecture to increase their reach, impact, or hide their identity, likespam campaigns, Denial of Service attacks, malware delivery or botnets control.Querying the DNS is often the first step of a connection between two devices on the Internet, so observing thistraffic can reveal ongoing spam campaigns, software updates distributions, misconfigurations, the rise of the Internetof Things or cyberwars between countries.However, studying the DNS is a challenging task, considering the massive volume of queries and its distributedarchitecture.Nevertheless, observing even a sample of the DNS traffic can still provide crucial insights into how the modern Internet isorganized and how different entities and systems use it.In this thesis, we explore the DNS as a way to establish trust and gather information, as it is used by many systems to establishtrust between entities on the Internet, and can provide valuable insights on the Internet usages and diversity.We dive into the domain name registration process and challenged the assumption that the data stored in multipledomain name registration databases are always coherent.This hypothesis made by previous works turned out to be true for the majority of domains, but we raise concerns onsome incoherence that still remain.We designed a naming scheme for constrained devices that leverages the DNS capabilities, allowing for efficientencoding of properties and location.This design also provides ways to discover devices based on these properties without addingload to the end devices.Finally, we study the security configuration and DNS traffic patterns of domains distributing spam.We propose a detection algorithm leveraging the differences between benign domains and spam domains to classify spam domains even before the start of a spam campaign,allowing defenders to take protective measures quickly and prevent attacks
Ates, Mikaël. „Identités numériques : gestion inter-organisationnelle centrée sur l'utilisateur et respectueuse de la vie privée“. Phd thesis, Université Jean Monnet - Saint-Etienne, 2009. http://tel.archives-ouvertes.fr/tel-00443910.
Der volle Inhalt der QuelleMouchard, Emilie. „L’accountability ou le principe de responsabilité en matière de protection des renseignements personnels“. Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS116.
Der volle Inhalt der QuelleBetween anglophone word and transversal concept, accountability ask about the responsability and the enforcement of its principle in privacy laws. Result of a social and legislative path, the imputabilité, who came throught the concept, shows privacy laws as a collaborative and individual regulation process, serving the responsability and the risks that cames with the information technologies and the achievement of the corporate social responsability.In the same time seeing as a goal, a mechanism and an instrument of an effective and efficient privacy, the accountability principle is a legal and a management principle, used by companies as an intern management technic. The realisation of the accountability project take place with the acknoledgement of the principle by the OECD, who highlight the accountability as an essential standard, a necessary mecanism and a moralization requirement according the risks that came throught social and technological evolutions on the right to privacy and its laws
Mahabir, Laetitia-Amanda. „L'identité personnelle et les réseaux sociaux“. Thesis, Aix-Marseille, 2014. http://www.theses.fr/2014AIXM1015.
Der volle Inhalt der QuelleThe identity of people in the digital space cannot be defined in one way. Its mode of expression is multiple. In fact, an individual can have several identities in the digital environment. It can also play different social roles according to social contexts that it faces. But what are effects of using identity masks ? The individual's identity within the social networks refers to the self-questioning, and others. The individualistic side and the community side of this identity are the foundation of the building of user's identity. Moreover, it appears that the wealth and the complexity of networks are the result of the confusion made by the law between individual and identity. In fact, the law is based on an essentialist conception of identity, by which each player has its own trajectory. But the individual does not live alone, he lives in a group and it is part of a network of social relations. The identity is made in the interaction of a claimed identity for oneself and assigned by others. Also, develop a personal identity on the fringes of the digital reality is to distinguish the person of the concept of online presence which is eminently declarative and performative.All this leads to reconsider the place of identity in the digital space. To understand the question of the construction of personal identity in social network, different approaches will be detailed. Those approaches are aimed to ensure everyone an identity according his wishes. Also, it will be necessary to adapt the existing measures to the virtual reality, in order to establish a more secure regime of personal identity, in respect of the rights of each user's personnality
Raad, Eliana. „Towards better privacy preservation by detecting personal events in photos shared within online social networks“. Thesis, Dijon, 2015. http://www.theses.fr/2015DIJOS079/document.
Der volle Inhalt der QuelleToday, social networking has considerably changed why people are taking pictures all the time everywhere they go. More than 500 million photos are uploaded and shared every day, along with more than 200 hours of videos every minute. More particularly, with the ubiquity of smartphones, social network users are now taking photos of events in their lives, travels, experiences, etc. and instantly uploading them online. Such public data sharing puts at risk the users’ privacy and expose them to a surveillance that is growing at a very rapid rate. Furthermore, new techniques are used today to extract publicly shared data and combine it with other data in ways never before thought possible. However, social networks users do not realize the wealth of information gathered from image data and which could be used to track all their activities at every moment (e.g., the case of cyberstalking). Therefore, in many situations (such as politics, fraud fighting and cultural critics, etc.), it becomes extremely hard to maintain individuals’ anonymity when the authors of the published data need to remain anonymous.Thus, the aim of this work is to provide a privacy-preserving constraint (de-linkability) to bound the amount of information that can be used to re-identify individuals using online profile information. Firstly, we provide a framework able to quantify the re-identification threat and sanitize multimedia documents to be published and shared. Secondly, we propose a new approach to enrich the profile information of the individuals to protect. Therefore, we exploit personal events in the individuals’ own posts as well as those shared by their friends/contacts. Specifically, our approach is able to detect and link users’ elementary events using photos (and related metadata) shared within their online social networks. A prototype has been implemented and several experiments have been conducted in this work to validate our different contributions
Lapointe, Sabrina. „L'intimité sur les réseaux sociaux numériques : une étude exploratoire sur la perception des jeunes femmes“. Mémoire, Université de Sherbrooke, 2016. http://hdl.handle.net/11143/9493.
Der volle Inhalt der QuelleNieto, Adrien. „La vie privée à l'épreuve de la relation de soin“. Thesis, Montpellier, 2017. http://www.theses.fr/2017MONTD024/document.
Der volle Inhalt der QuelleThe existence of legal mechanisms for the protection of privacy under common law is irrefutable. Those that the patient can claim during the care relationship remain unclear. The specific nature of this relationship, and the physical and moral impairments to privacy that are consumed in it - look, touch, nudity and the exchange of private information - justify a special framework and specific protections, existing but repensable, for accompany the stakes posed by the evolution and the modification of the care relationship. The emergence of new actors in health, with their own aspirations, undoubtedly modifies the objective and consequences of this relationship. Health data, an underestimated component of privacy, in that it n° longer passes only from the patient to the healthcare professional - and vice versa - must be framed, both the economic and political stakes associated with it . The "value" of privacy must be refocused, at a time when consumption, instantaneous exchange of information and “publicy” seem to have taken precedence over it
Codron, Clemence. „La surveillance diffuse : entre Droit et Norme“. Thesis, Lille 2, 2018. http://www.theses.fr/2018LIL2D002/document.
Der volle Inhalt der QuelleThe purpose of this research is to understand how diffuse surveillance fits into the evolution of legal concepts of privacy and personal data. Contrary to the abundant literature on the subject of surveillance, it is not a questionhere of highlighting the need to find a balance between surveillance in its security dimension and the protection of privacy and data, as a fundamental freedom recognized by French and European institutions. This search for a balance between security and freedom must necessarily be overcome to understand the phenomenon of diffuse surveillance. Surveillance is no longer just a search for information about a potentially dangerous individual. Rather, it is a continuation of what Hannah Arendt calls the « crisis of culture ». Diffuse surveillance is even oneof the features of contemporary culture dominated by fear, consumption and alienation by technology. Having become the new accepted social norm, the diffuse surveillance deinstitutes the right of the personal data and the protection of the private life. Gradually, it also deinstitutes the Law to profit from the economic liberalism that it carries within it
Sondeck, Louis-Philippe. „Privacy and utility assessment within statistical data bases“. Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0023.
Der volle Inhalt der QuellePersonal data promise relevant improvements in almost every economy sectors thanks to all the knowledge that can be extracted from it. As a proof of it, some of the biggest companies in the world, Google, Amazon, Facebook and Apple (GAFA) rely on this resource for providing their services. However, although personal data can be very useful for improvement and development of services, they can also, intentionally or not, harm data respondent’s privacy. Indeed, many studies have shown how data that were intended to protect respondents’ personal data were finally used to leak private information. Therefore, it becomes necessary to provide methods for protecting respondent’s privacy while ensuring utility of data for services. For this purpose, Europe has established a new regulation (The General Data Protection Regulation) (EU, 2016) that aims to protect European citizens’ personal data. However, the regulation only targets one side of the main goal as it focuses on privacy of citizens while the goal is about the best trade-off between privacy and utility. Indeed, privacy and utility are usually inversely proportional and the greater the privacy, the lower the data utility. One of the main approaches for addressing the trade-off between privacy and utility is data anonymization. In the literature, anonymization refers either to anonymization mechanisms or anonymization metrics. While the mechanisms are useful for anonymizing data, metrics are necessary to validate whether or not the best trade-off has been reached. However, existing metrics have several flaws including the lack of accuracy and the complexity of implementation. Moreover existing metrics are intended to assess either privacy or utility, this adds difficulties when assessing the trade-off between privacy and utility. In this thesis, we propose a novel approach for assessing both utility and privacy called Discrimination Rate (DR). The DR is an information theoretical approach which provides practical and fine grained measurements. The DR measures the capability of attributes to refine a set of respondents with measurements scaled between 0 and 1, the best refinement leading to single respondents. For example an identifier has a DR equals to 1 as it completely refines a set of respondents. We are therefore able to provide fine grained assessments and comparison of anonymization mechanisms (whether different instantiations of the same mechanism or different anonymization mechanisms) in terms of utility and privacy. Moreover, thanks to the DR, we provide formal definitions of identifiers (Personally Identifying Information) which has been recognized as one of the main concern of privacy regulations. The DR can therefore be used both by companies and regulators for tackling the personal data protection issues
Sondeck, Louis-Philippe. „Privacy and utility assessment within statistical data bases“. Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0023/document.
Der volle Inhalt der QuellePersonal data promise relevant improvements in almost every economy sectors thanks to all the knowledge that can be extracted from it. As a proof of it, some of the biggest companies in the world, Google, Amazon, Facebook and Apple (GAFA) rely on this resource for providing their services. However, although personal data can be very useful for improvement and development of services, they can also, intentionally or not, harm data respondent’s privacy. Indeed, many studies have shown how data that were intended to protect respondents’ personal data were finally used to leak private information. Therefore, it becomes necessary to provide methods for protecting respondent’s privacy while ensuring utility of data for services. For this purpose, Europe has established a new regulation (The General Data Protection Regulation) (EU, 2016) that aims to protect European citizens’ personal data. However, the regulation only targets one side of the main goal as it focuses on privacy of citizens while the goal is about the best trade-off between privacy and utility. Indeed, privacy and utility are usually inversely proportional and the greater the privacy, the lower the data utility. One of the main approaches for addressing the trade-off between privacy and utility is data anonymization. In the literature, anonymization refers either to anonymization mechanisms or anonymization metrics. While the mechanisms are useful for anonymizing data, metrics are necessary to validate whether or not the best trade-off has been reached. However, existing metrics have several flaws including the lack of accuracy and the complexity of implementation. Moreover existing metrics are intended to assess either privacy or utility, this adds difficulties when assessing the trade-off between privacy and utility. In this thesis, we propose a novel approach for assessing both utility and privacy called Discrimination Rate (DR). The DR is an information theoretical approach which provides practical and fine grained measurements. The DR measures the capability of attributes to refine a set of respondents with measurements scaled between 0 and 1, the best refinement leading to single respondents. For example an identifier has a DR equals to 1 as it completely refines a set of respondents. We are therefore able to provide fine grained assessments and comparison of anonymization mechanisms (whether different instantiations of the same mechanism or different anonymization mechanisms) in terms of utility and privacy. Moreover, thanks to the DR, we provide formal definitions of identifiers (Personally Identifying Information) which has been recognized as one of the main concern of privacy regulations. The DR can therefore be used both by companies and regulators for tackling the personal data protection issues
Alliot, Sandie. „Essai de qualification de la notion de données à caractère personnel“. Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCB001.
Der volle Inhalt der QuellePersonal data has undergone a major change which justifies a new study of this notion. This particular data is at the heart of the digital economy and thus stirs numerous claims. What is at stake here is to try to work out a balance between different claims such as managing operators' will of appropriation and protecting people concerned by the data, for example. This is why it is essential to find a precise definition and adequate qualifications of personal data to find a balance between the various interests. The thesis will focus on the necessity to adopt a new vision of personal data, to show its current characteristics so as to manage it efficiently
Mohty, Ola. „L'information du consommateur et le commerce électronique“. Thesis, Rennes 1, 2017. http://www.theses.fr/2017REN1G009.
Der volle Inhalt der QuelleWith the current significant expansion in the concept of legal information, consumers may face some major difficulties when deciding to explore the online market. Numerous sources can provide multiple information, and buyers must conform to some chaotic practices that making it difficult to distinguish between relevant and irrelevant content. However, a well informed online consumer must rely on an authentic source with a relevant content. Therefore, it is clear that regulations related to the obligation for providing information to the consumer need to be examined closely. The recent evolution of the online market and the structural imbalance between the professional and the consumer revealed a number of significant discrepancies highlighting the need to revise the bases for consumer’s information obligation. At present, such a new concept of online information is emerging, with an extended “obligation to inform” and a permanent engagement with a reactive consumer
Blouin, Thomas. „L'autre par ses traces : les personnes endeuillées vis-à-vis des archives numériques de la personne décédée“. Master's thesis, Université Laval, 2018. http://hdl.handle.net/20.500.11794/33140.
Der volle Inhalt der QuelleThe increasing importance of digital technologies in our lives has lead to a new kind of materialisation of social life rather than to its dematerialisation. What was once ephemeral or perceived by few only has now the possibility to become at any moment “objective” through devices, involved in displaying and archiving evidence of fleeting instants. Our daily use of digital technologies produces a myriad of digital data disposed to become traces of the Self. Thinking this possibility of exploring these traces now conceived as “objective” along with what has been qualified as the “intimisation” of death rituals, I was concerned about the use of the deceased’s digital footprint by their relative or friend. In order to do so, I have conducted 16 interviews with people who had to interact with a close deceased’s digital data and devices. If some interviewees ignored or saw no interest in this footprint, most of them found the possibility to extend, perhaps even modify and shape again the relationship with the deceased. Others were peculiarly cautious, trying to avoid finding information that could reactivate memories that might sadden them or lead them to an unexpected reality. People refrain the browsing of what might appear as incoherent with the relationship one has had with the deceased; therefore they cultivate the image of the deceased that is in line with their memories. They balance between trying to leave to the deceased what might be part of its intimacy and using these data and devices to give, beyond death, shape and consistency to a personal and positive image of the deceased.
Carugati, Christophe. „Competition law and economics of big data : a new competition rulebook“. Thesis, Paris 2, 2020. http://www.theses.fr/2020PA020003.
Der volle Inhalt der QuelleThis thesis addresses Big Data issues in competition law in three chapters. Chapter one proposes new economic tools to define the relevant market and the market power in the data-driven economy. It argues the need to reform the relevant market and the market power by considering new tools and a menu of key features relevant to the market power. Chapter two proposes new law and economics analysis for data-driven antitrust and merger practices. It considers debated topics related to the integration of privacy in the assessment of antitrust and merger practices, algorithmic collusion and pre-emptive mergers. It argues the need to integrate privacy in any data-driven antitrust and merger practices as data imply necessarily privacy and data protection issues. Finally, chapter three proposes to regulate the digital economy. It demonstrates that the economy is highly concentrated and that the markets cannot correct themselves market failures. It analyzes recommendations from the government reports (Furman et al, Crémer et al, Schallbruch et al, ACCC report, and Stigler report) and It proposes and discusses other original proposals
Larher, Yann-Maël. „Les relations numériques de travail“. Thesis, Paris 2, 2017. http://www.theses.fr/2017PA020012/document.
Der volle Inhalt der QuelleAn emerging phenomenon, online social network and mobile apps usage has increased exponentially and is becoming widespread. Their exponential adoption offers a multitude of possibilities which is gradually invading living spaces, and in particular the professional world. The link between new technologies and employment law is not really new and dates from the arrival of IT (Information Technology) into the professional world, especially in collective relationships. However, recent doctrine and jurisprudence examinations surface new legal issues in regards to the use of new communication means that don’t have any time and space limits. Internet usage, and more precisely social network usage within companies, destabilises employment laws and leads to a confrontation between employer rights and the employees’ emerging rights and freedoms according to new practices. Companies’ relationship to social networks resurface questions about the renewal of industrial relationships inside a company that belongs to a democratic information-based society. Reshaping old frameworks, and new communication technologies encourages a wider reconsideration of future employment laws
Moussa, Nadine. „Multi scale modelling and numerical simulation of metal foam manufacturing process via casting“. Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLC021/document.
Der volle Inhalt der QuelleThe objective of this work is to elaborate a new manufacturing process of metal foams via casting by modelling the infiltration and solidification of liquid metal inside a porous medium.However, due to the complexity of this problem the study is divided into two steps. First, at local scale one strut of the metal foam is considered as a capillary tube and the infiltration and solidification of liquid metal inside a cylindrical mould is studied. Second, a macroscopic model of diffusive solidification is derived using the volume average method. The local model is coded in an open source CFD tool and three parametric studies were done where the relations between the infiltration length and time as function of the operating parameters are determined. The modelling of the solidification of liquid metal inside a porous medium is simplified by considering that the mould is fully saturated by liquid metal at rest, solidification occurs by pure diffusion. Local thermal equilibrium (LTE) is considered between the solid and liquid phases of the metal while local thermal non equilibrium (LTNE) is retained between the metallic mixture and the mould. The associated closure problems as well as the macroscopic problem were numerically solved
Fouquet, Romain. „Improving Web User Privacy Through Content Blocking“. Electronic Thesis or Diss., Université de Lille (2022-....), 2023. http://www.theses.fr/2023ULILB011.
Der volle Inhalt der QuelleThe web has seen steady growth since its inception in 1990. Along with this constant production of content, user tracking has appeared early and seen continuous development. Users are thus followed across websites and their behavior observed on individual web pages. To combat user tracking, browser vendors and extension developers have proposed different strategies, ranging from site isolation to asking the user before using sensitive features. In this thesis, we focus on one of this client-side privacy protection strategy: content blocking. Content blocking consists in preventing unwanted parts of web pages from being downloaded or executed, thus protecting the user from them. Existing content blocking tools mostly rely on filter lists which specify what parts of web pages to block. They however suffer from several issues, including incomplete coverage and being unable to target certain kinds of resources. We present four contributions for improving user privacy by modifying page content:1. We measure the dependency on common web page elements on JavaScript and how much blocking JavaScript can improve user privacy. We find that 43 % of web pages from our sample do not strictly depend on JavaScript and that 67 % of pages are likely to be usable when caring only about the main page section.2. Building on the acquired knowledge of page breakage when blocking JavaScript, we design a set of repairs to repair common page breakage types. We introduce the concept of User Browsing Intent (UBI) and, focusing on the ‘read-only' UBI, we measure how much these repairs are useful in the case of this UBI.3. We propose a server-side system to substitute interface page elements usually relying on JavaScript with noscript alternatives, and discuss the benefits of this replacement in particular in terms of device energy savings and security.4. We devise a signature scheme to generate robust signatures of JavaScript functions, and detect the bundling of tracking functions from known tracking libraries with functional code. We find that 22.7 % of domains in our sample bundle such tracking functions with functional code, effectively circumventing existing blocking tools. We propose a technique for blocking these tracking functions while preserving functional code
Walczak, Nathalie. „La protection des données personnelles sur l’internet.- Analyse des discours et des enjeux sociopolitiques“. Thesis, Lyon 2, 2014. http://www.theses.fr/2014LYO20052/document.
Der volle Inhalt der QuelleThis thesis, in Communication and Information Sciences, raises the question of the internet personal data protection through the discourses analysis of four actors concerned with this subject: internet companies, authorities regulating, French population and national press. The objective is to understand how, through the discourses of each one of these actors, the question of the jamming of the spheres private and public about the Internet takes shape. It is a question which increases with the development of the Internet, in particular with the multiplication of the social digital network, which gives to the Internet users various opportunities to display their privacy. The multiplication of the interpersonal relationship devices connection is then accompanied by a contemporary dialectical between private and public spheres, not always controlled by concerned people.This interaction between private and public leads to a transfert of the border wich separates the two spheres and can involves some drifts on behalf of specialized companies, such Google and Facebook, toward the aggregation of personal data contents. Indeed, databases are central in the economic system of these companies and gained a commercial value. However, the commercial use as of these data is not necessarily known by the user and can be realized without its agreement, at least in an explicit way. This double questioning related to the jamming of the private and public spheres, i.e., firstly, the individual aspect where the Internet user is incited to reveal personal elements more and more, and, secondly, the related aspect with the selling of the data by the Internet companies, then generates the question of the individual freedom and data confidentiality. The regulating authorities, in France or in European Union, try to provide answers in order to protect the Internet users by setting up actions relating to the right to be forgotten or by prosecuting Google, for example, when the company does not conform to the laws in force on the territory concerned. The various angles of incidence as well as the diversity of the studied actors required the constitution of a multidimentional corpus in order to have a comparative approach of the different representations. This corpus includes texts registered like political discourses, regulating authorities speeches, companies of the Internet speeches, specifically Google and Facebook, or press speeches which occupy a meta-discursive position since they repeat speeches of the actors previously stated. It includes also oral speeches made up of talks especially recorded for this research with some persons taken randomly in the French population. A quantitative analysis of the discourses between 2010 and 2013, contemporary period with the thesis, permit to carry out a first sorting and to select only the most relevant speeches compared to our hypothesis. The qualitative analysis which followed was based on the theoretical framework previously elaborate in order to cross the representations of the actors in connection with the personal data and to highlight the various visions about this question
Lukasik, Stéphanie. „La reformulation de la figure du leader d'opinion au prisme de la réception de l'information des jeunes adultes via les réseaux socionumériques“. Electronic Thesis or Diss., Aix-Marseille, 2021. http://www.theses.fr/2021AIXM0124.
Der volle Inhalt der QuelleSocial-digital networks are linked to the user-receiver activity theorized by the Columbia school. The link between the media system and the social system that the Columbia school anticipated seems all the more relevant with the collect of information via social networks. Henceforth, the media must reckon with social networks and consequently with users-receivers. By sharing information, each user-receiver can become a short-term opinion leader. The one-off act of sharing materializes this new filter which symbolizes the passage to the second step flow of communication. Sharing is therefore the circumstantial reification of personal influence which transforms the user-receiver into an opinion leader. In this 2.0 user-receiver model of the new media digital-social networks ecosystem, 2.0 opinion leaders can be compared to opinion sharers. In order to understand the situations of opinion influence at work in circulation and reception activities, the information filter processes will be studied by taking up the structural elements of the model proposed by the Columbia school. We are interested in what "real people of everyday life" choose and do with media on social-digital networks, like the Columbia school which was interested in the people's choice and in particular in the part played by people in the flow of mass communications. The objective of this research is thus to transpose this Columbia model to the context of social-digital networks in order to update it and redefine, within it, the notion of opinion leader whose acceptance has been altered.Our contribution is therefore that of a social analysis of human communication of information via social-digital networks
Friot, Nicolas. „Itérations chaotiques pour la sécurité de l'information dissimulée“. Thesis, Besançon, 2014. http://www.theses.fr/2014BESA2035/document.
Der volle Inhalt der QuelleDiscrete dynamical systems by chaotic or asynchronous iterations have proved to be highly interesting toolsin the field of computer security, thanks to their unpredictible behavior obtained under some conditions. Moreprecisely, these chaotic iterations possess the property of topological chaos and can be programmed in anefficient way. In the state of the art, they have turned out to be really interesting to use notably through digitalwatermarking schemes. However, despite their multiple advantages, these existing algorithms have revealedsome limitations. So, these PhD thesis aims at removing these constraints, proposing new processes whichcan be applied both in the field of digital watermarking and of steganography. We have studied these newschemes on two aspects: the topological security and the security based on a probabilistic approach. Theanalysis of their respective security level has allowed to achieve a comparison with the other existing processessuch as, for example, the spread spectrum. Application tests have also been conducted to steganalyse and toevaluate the robustness of the algorithms studied in this PhD thesis. Thanks to the obtained results, it has beenpossible to determine the best adequation of each processes with targeted application fields as, for example,the anonymity on the Internet, the contribution to the development of the semantic web, or their use for theprotection of digital documents. In parallel to these scientific research works, several valorization perspectiveshave been proposed, aiming at creating a company of innovative technology
Ben, Fredj Feten. „Méthode et outil d’anonymisation des données sensibles“. Thesis, Paris, CNAM, 2017. http://www.theses.fr/2017CNAM1128/document.
Der volle Inhalt der QuellePersonal data anonymization requires complex algorithms aiming at avoiding disclosure risk without losing data utility. In this thesis, we describe a model-driven approach guiding the data owner during the anonymization process. The guidance may be informative or suggestive. It helps the data owner in choosing the most relevant algorithm given the data characteristics and the future usage of anonymized data. The guidance process also helps in defining the best input values for the algorithms. In this thesis, we focus on generalization algorithms for micro-data. The knowledge about anonymization is composed of both theoretical aspects and experimental results. It is managed thanks to an ontology
Lukacs, Adrienn. „Protection of employees' right to privacy and right to data protection on social network sites : with special regard to France and Hungary“. Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01D041.
Der volle Inhalt der QuelleOnline social network sites have gained considerable importance in everyday life. Their use results in the unprecedented share of personal data : individuals from all over the globe share personal information in a quality and quantity never seen before. Employees and prospective employees are amongst users as well, which raises privacy and data protection issues specific to the context of employment. Although the “traditional” ways of employee monitoring, such as CCTV surveillance, monitoring of the use of Internet and e-mail, etc. are already regulated both at the international and at the national (French and Hungarian) level, the comprehensive regulation of social network sites with regard to the context of employment is yet to be elaborated. Social network sites have fundamentally influenced conceptions of privacy and data protection, resulting in the boundaries of work and personal life becoming increasingly blurred, both within and outside working hours. Yet, the processing of personal data obtained from social network sites increasingly raises the question of the protection of employees’ rights – particularly the protection of the right to privacy and the right to data protection. These rights must be balanced notably against the employer’s right to control and monitor, which ensue from the employer’s right to property (ensuring the equipment provided by the employer is used in accordance with the purpose of the employment relationship), the right to protect his/her economic interest (e.g. through ensuring productivity, the protection of reputation) and occupational safety and health (which confers obligations on the employer). Thus, the dissertation examines how the existing rules of labour law and of data protection law in France and in Hungary can be applied to social network sites and what the main challenge posed by them are, particularly in the phase of recruitment and during the use of social networks during and outside working hours. The main question to be answered by the dissertation is: in the light of the increasingly blurred boundaries, where should the balance be struck between the employees’ and the employer’s rights?
Az online közösségi oldalak jelentős szerepet játszanak a mindennapi életben. Használatuk során az egyének soha nem látott minőségben és mennyiségben osztják meg személyes adataikat, szerte az egész világon. A munkavállalók és a leendő munkavállalók szintén a felhasználók közé tartoznak, ami a foglalkoztatás kontextusában specifikus kérdéseket vet fel a magánélet és a személyes adatok védelme terén. Bár a munkavállalók megfigyelésének „hagyományos” módszereit, mint például a kamerás megfigyelést, az internet és az e-mail használatának megfigyelését, már mind nemzetközi, mind tagállami (francia és magyar) szinten szabályozzák, a közösségi oldalak foglalkoztatással összefüggő kimerítő szabályozása még kidolgozás alatt áll. A közösségi hálózati oldalak alapjaiban hatnak a magánéletre és a személyes adatok védelmére, aminek eredményeként a munka és magánélet határai egyre inkább elmosódnak, mind a munkaidőn belül, mind azon kívül. Ugyanakkor a közösségi oldalakról származó személyes adatok kezelése fokozottan felveti a munkavállalók jogainak védelmének kérdését – különös tekintettel a magánélet védelmére és a személyes adatok védelméhez való jogra. Ezeket a jogokat össze kell vetni különösen a munkáltató ellenőrzési és felügyeleti jogával, amely a munkáltató tulajdonhoz fűződő jogából (pl.: annak biztosítása, hogy a munkáltató által biztosított felszerelést a munkavállaló a munkaviszony céljának megfelelően használja), valamint a jogos gazdasági érdekeinek védelméből. (pl. produktivitás biztosítása, jó hírnév védelme) és a munkahelyi biztonság és egészségvédelemből (amely kötelezettségeket ró a munkáltatóra) következik. Következésképp, a disszertáció azt vizsgálja, hogy a Franciaországban és Magyarországon már létező munkajogi és adatvédelmi rendelkezések miként alkalmazhatók a közösségi oldalakra, és melyek az általuk felvetett legfőbb kihívások, különösen a munkaerőfelvétel, valamint a közösségi oldalak munkaidőben és azon kívül történő használata terén. A disszertáció által megválaszolandó fő kérdés az, hogy a fokozottan elmosódó határok fényében hol kell megtalálni az egyensúlyt a munkavállalók és a munkáltatók jogai között?
Ben, Fredj Feten. „Méthode et outil d’anonymisation des données sensibles“. Electronic Thesis or Diss., Paris, CNAM, 2017. http://www.theses.fr/2017CNAM1128.
Der volle Inhalt der QuellePersonal data anonymization requires complex algorithms aiming at avoiding disclosure risk without losing data utility. In this thesis, we describe a model-driven approach guiding the data owner during the anonymization process. The guidance may be informative or suggestive. It helps the data owner in choosing the most relevant algorithm given the data characteristics and the future usage of anonymized data. The guidance process also helps in defining the best input values for the algorithms. In this thesis, we focus on generalization algorithms for micro-data. The knowledge about anonymization is composed of both theoretical aspects and experimental results. It is managed thanks to an ontology
Douplat, Marion. „Les décisions de limitations et d'arrêts des thérapeutiques à l'épreuve de la temporalité des urgences : enjeux éthiques“. Thesis, Aix-Marseille, 2018. http://www.theses.fr/2018AIXM0756.
Der volle Inhalt der QuelleDecisions of withholding or withdrawing life-sustaining treatments are frequent in emergency departments where death is an everyday reality. These decisions lead to ethical dilemmas for physicians, nurses, and relatives with regards to the timing of the emergency departments and the evolution of the French legislation in particular the law on the rights of the patients and the persons who are nearing the end of life. Moreover, the caregivers should have an ethical thinking-process in order to respect ethical principles such as autonomy, beneficence, non-malfeasance and justice. There seems to be a conflict between the emergency situation and the complexity of the decision-making process. There is only few data concerning the decisions of withholding or withdrawing life sustaining treatments especially about modality of these decisions and the implications for caregivers and relatives. Because of the lack of data, we decided to explore the physicians’ experience during the decision-making process in the emergency departments and the perception of the relatives after the decision of withholding or withdrawing life-sustaining treatment. Our study consists in three parts: a study which evaluates the physicians’ experience during the decision-making process; then, a study describing the relatives’ perception of the decisions of withholding or withdrawing life-sustaining treatments and finally a study about the involvement of general practitioners in the decision-making process
Shulga-Morskaya, Tatiana. „La démocratie électronique, une notion en construction“. Thesis, Bordeaux, 2017. http://www.theses.fr/2017BORD0958.
Der volle Inhalt der QuelleRepresentative democracy remains essentially a representative government that was created precisely to avoid all the citizens to participate directly in political decision-making. Implementation of direct participation’s instruments in form of e-democracy creates a conflict within this government, a conflict which can be solved only by a renewal of representative democracy concept, even its substitution by another idea committed to reconciling representation and participation. This thesis aims a reflection on a concept of government capable of integrating e-democracy.Such an integration highlights the interdependent character of the link between democracy and human rights that are exposed to totally new threats in the digital era. The possibility to introduce e-democracy is conditional upon the reinforced protection of such essential rights and freedoms: as freedom of expression and right to respect for private and family life in the digital environment, as well as recognition of new rights based on personal self-determination. Implementation of e-democracy can also challenge well-established concepts such as majority principle or require their reconsideration, as in the case of good governance
Sagnières, Louis. „La démocratie à l’heure de l’internet : autonomie politique, vie privée et espace public dans un environnement numérique“. Thèse, 2015. http://hdl.handle.net/1866/13730.
Der volle Inhalt der QuelleMy goal in this thesis is twofold. First I want to understand the impact the Internet can have on democracy, that is to say, I want to understand what this technology changes to democracy. In order to do this, it is necessary to possess a clear and precise conceptual framework of the meaning of democracy and to ground my analysis in empirical literature. Second, I want to give a normative account of what needs to be done to ensure that the impact of the Internet on democracy will stay positive. To accomplish these goals, one first needs to have a clear conception of democracy. That is why I will offer, in the first part of my thesis, an understanding of democracy as political autonomy. I will offer an analysis of this last concept in my first chapter. I will then analyze two of its central elements, namely privacy and public space. In the second part of my thesis, I will offer an analysis that is both precise and empirically grounded of the impact of the internet on these two elements, in order to present an argument that will not simply be a priori and speculative. It is important to notice that the conclusions that I reach are only of value if the Internet doesn't evolve. It is therefore quite possible that the internet ceases to allow for greater political autonomy as I explain in my second part. It is thus important to carry out the normative part of my project to identify to what extent it might be necessary to do something to ensure the positive impact of the Internet on political autonomy. So, in the last part of my thesis, I show that it is necessary to protect the non-discriminatory Internet architecture, but that it is not necessary to protect its generative ecosystem. I will conclude by showing the importance of providing all the elements of a digital literacy, if we want that all benefit from the opportunities offered by the Internet.