Dissertations / Theses on the topic 'Fournisseurs de services Internet – France'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 29 dissertations / theses for your research on the topic 'Fournisseurs de services Internet – France.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Albrieux, Sandrine. "La responsabilité du fournisseur de moyens de communication électronique." Paris 2, 2004. http://www.theses.fr/2004PA020057.
Full textThe supplier of electronic ways of communication - who is not the author nor the editor of the informations circulating on internet, but the person who offers to the suppliers of contents the instruments permitting or facilitating the diffusion or the localization to the public of the information they have produced - has never been able to evolve in a " no-go area". His activities do not escape the rulings of the law when he supplies intentionally or unwisely the cause of the offence. Apart a few assumptions where he can put forward his irresponsibility or exemption of responsibility, dedicated by law for the trust in digital economy, he must answer for his harmful attitude towards others or affecting society. His responsibility can be committed as conniving when he is part of the criminal offense of the supplier of contents knowlingly and voluntarily, providing that the offense of the principal author receive the qualification of continuous offense. His attitude is reprehensible from then on he has the knowledge or could not ignore the illicitness of the content being transmitted by him, housed, reference of which is facilitated and do not act promptly to withdraw it from the network or to make access impossible, letting in this way continue the harmful action he could prevent or stop. But in a universe transcending the frontiers, the implementation of the judicial answer can be delicate and the debt of the supplier of electronic ways of communication settled abroad stand unfulfilled, because the authority of the French decisions does not have an international value as to impress the foreign authorities
El, Hayek Audine. "La responsabilité des intermédiaires de l'internet." Nantes, 2006. http://www.theses.fr/2006NANT4016.
Full textRichebourg, Aube. "L'internet associatif en France et en Allemagne : sociologie d'une rémanence utopique." Electronic Thesis or Diss., Paris, EHESS, 2024. http://www.theses.fr/2024EHES0134.
Full textOn the fringes of the digital revolution, unknown to the general public, volunteers have been administering and providing non-profit Internet services for thirty years. These associations, some of them very old, are trying to keep alive the organisational utopia that dates back to the beginnings of the network and the values associated with it. But what is it that still drives volunteers to defend this lost cause? What function does their commitment fulfil? And how does it fit into the evolution of the internet over the last thirty years?This thesis offers a sociological analysis of the “utopian practice” and the conditions of its persistence, based on a comparative survey between France and Germany combining ethnography and archival work. Using the perspective of configuration analysis borrowed from Norbert Elias, we will explain how the conservative and adaptive capacity of this associative movement responds to the relative frustrations of those disappointed by the digital revolution, by crossing structural, organisational and individual levels of analysis.The thesis begins by tracing the sociogenesis of the associative Internet in the 1990s, between pioneering practices, economic marginalisation and discreet insertion into local public connection policies. It was in the 2000s that associative activity became ‘utopian’, through the actions of ‘utopian entrepreneurs’, on the fringes of the then emerging activism in defence of digital rights and freedoms. Secondly, the thesis shows, from an organisational point of view, how Internet associations were shaped from the inside by successive waves of volunteers who, according to their own socialisation on the Internet, invested in a sense of the cause and a corresponding organisational model. Finally, on an individual level, thanks to a utopian division of labour that enabled people to practise their profession in a different way, we will explain how involvement in these associations was rewarded for pioneers and later volunteers alike. As a link between the alternative socialisations that make up the relationship to learning, the desire for autonomy, freedom and security, the associations create the conditions for an individual utopia for those who manage to join them, compensating for the power relationships they experience at work.So, while organising the preservation of pre-market practices of collaboration between peers, the associative internet offers its followers avenues of transformation, particularly regarding the individual and collective relationship to activity. The comparison enables us to grasp the contours of a European Internet utopia and what the diversity of utopian practices owes to national power structures, particularly regarding regulation of the telecommunications market. Beyond a normative perspective that sees utopia in society as a factor for unambiguous change, or as a system of ideas opposing conservative fictions and geared towards a better society, this thesis aims to contribute to a sociological understanding of utopian phenomena based on an analysis of their logical practices
Marchet, Nathalie. "La responsabilité civile des intermédiaires techniques de l'Internet." Toulouse 1, 2003. http://www.theses.fr/2003TOU10056.
Full textIn an attempt to solve the delicate issue of responsability for the service providers on the internet, many case laws and new statutes have been published over the last few years. A strongly opinionated discussion has broken out, questioning the future of Storage Service Providers, raising doubts about the amount of responsability taken by other Internet third parties. The United States of America have anticipated this issue as early as 1998 by voting the DMCA based on a general principal of limitation on liability relating to material on line. The EU tried to follow the American way, setting up some common rules for all European countries. France is still far behind after passing a legislation (08/01/00) which was little satisfaying and heavily criticised by the professioals of the Internet industry. However this legislation is presently being looked into and changed accordingly. Our experience within the Expert center CELOG, together with the agency for the Protection of Programs, enabled us to work on the civil responsabilities for the five main categories of service providers which role more or less involve an access to the information available
Biri, Aroua. "Proposition de nouveaux mécanismes de protection contre l'usurpation d'identité pour les fournisseurs de services Internet." Thesis, Evry, Institut national des télécommunications, 2011. http://www.theses.fr/2011TELE0009/document.
Full textMore and more organizations are computerized and more an organization is great, plus it can be the target of Internet attacks. Moreover, some of them have a growing number of electronic equipments that can be connected to the Internet from various locations (home, car, workplace, etc.). These devices form a so-called personal area network that allows the development of new applications centered on users. The ISPs can then expand their service offerings by providing a secure supply of such networks. According to the report of the firm “Arbor Networks”, entitled "Worldwide Infrastructure Security Report ", the most severe threats are related to distributed denial of service. This type of attack aims to make available a service by preventing legitimate users from using it. It uses the technique of identity theft that involves the creation of packages (like IP, ARP, etc.) with a forged source address and that in order to usurp the Identity of the issuer or of the computer system. Thus, the technique of identity theft allows to render a service unavailable, to listen, to corrupt, to block traffic from Internet users or to undermine the legitimate operation of routing protocols and personal networks. Moreover, the technique of identity theft is also used for prohibited activities by "HADOPI" law in France and related to illegal downloading issues. Thus, the ISPs have a duty to protect their customers from attacks based on the technique of identity theft. The mechanisms of protection against spoofing attacks for access networks are crucial for customer adoption of new applications offered by Internet service providers. This part of the doctoral thesis is part of the European project “MAGNET Beyond" whose vision is to put into practice the concept of personal networks, with the ultimate objective to design, develop, prototype and validate the concept. In the context of user equipment’s access to the network of an Internet services provider from a public place, we proposed a cross-layer protocol based on the principles of information theory. This protocol fixes the security hole not addressed by other proposals that is the attack of identity theft that occurs at the beginning of communication and thus protects users against the middle man attacks. We proposed that the person who wants to have secure access to the Internet must be on a specific circle has been called "RED POINT" so that the attacker is not able to be on the same circle at the same time. The proposed cross-layer protocol can be divided into three phases: the phase of checking the position of the user, the extraction phase of the shared secret of the physical layer and the phase of the derivation of the shared key at the MAC layer. We subsequently validated our solution through a formal tool AVISPA and presented the results of its implementation. In a private context, communication between devices convey users' personal data which may be confidential, so we must prevent equipment not belonging to the legitimate user to access its network. Thus, we proposed two mechanisms of protection against attacks based on spoofing so that illegitimate equipment is unable to impersonate legitimate equipment. The first phase will be dedicated to personal networks and the second will be dedicated to the particular case of medical networks. Regarding the mechanism dedicated to personal networks, we have proposed the use of a protocol based on out-of-band channel in order to provide certificates to user equipments. We derive bilateral key for personal network’s equipments of the same site and between equipments at remote sites. Concerning the particular case of medical networks, we proposed to cover their deployment phases and their operational phases. This proposal was submitted to the IEEE 802.15.6 working group that conducts research for the standardization of medical networks […]
Biri, Aroua. "Proposition de nouveaux mécanismes de protection contre l'usurpation d'identité pour les fournisseurs de services Internet." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2011. http://www.theses.fr/2011TELE0009.
Full textMore and more organizations are computerized and more an organization is great, plus it can be the target of Internet attacks. Moreover, some of them have a growing number of electronic equipments that can be connected to the Internet from various locations (home, car, workplace, etc.). These devices form a so-called personal area network that allows the development of new applications centered on users. The ISPs can then expand their service offerings by providing a secure supply of such networks. According to the report of the firm “Arbor Networks”, entitled "Worldwide Infrastructure Security Report ", the most severe threats are related to distributed denial of service. This type of attack aims to make available a service by preventing legitimate users from using it. It uses the technique of identity theft that involves the creation of packages (like IP, ARP, etc.) with a forged source address and that in order to usurp the Identity of the issuer or of the computer system. Thus, the technique of identity theft allows to render a service unavailable, to listen, to corrupt, to block traffic from Internet users or to undermine the legitimate operation of routing protocols and personal networks. Moreover, the technique of identity theft is also used for prohibited activities by "HADOPI" law in France and related to illegal downloading issues. Thus, the ISPs have a duty to protect their customers from attacks based on the technique of identity theft. The mechanisms of protection against spoofing attacks for access networks are crucial for customer adoption of new applications offered by Internet service providers. This part of the doctoral thesis is part of the European project “MAGNET Beyond" whose vision is to put into practice the concept of personal networks, with the ultimate objective to design, develop, prototype and validate the concept. In the context of user equipment’s access to the network of an Internet services provider from a public place, we proposed a cross-layer protocol based on the principles of information theory. This protocol fixes the security hole not addressed by other proposals that is the attack of identity theft that occurs at the beginning of communication and thus protects users against the middle man attacks. We proposed that the person who wants to have secure access to the Internet must be on a specific circle has been called "RED POINT" so that the attacker is not able to be on the same circle at the same time. The proposed cross-layer protocol can be divided into three phases: the phase of checking the position of the user, the extraction phase of the shared secret of the physical layer and the phase of the derivation of the shared key at the MAC layer. We subsequently validated our solution through a formal tool AVISPA and presented the results of its implementation. In a private context, communication between devices convey users' personal data which may be confidential, so we must prevent equipment not belonging to the legitimate user to access its network. Thus, we proposed two mechanisms of protection against attacks based on spoofing so that illegitimate equipment is unable to impersonate legitimate equipment. The first phase will be dedicated to personal networks and the second will be dedicated to the particular case of medical networks. Regarding the mechanism dedicated to personal networks, we have proposed the use of a protocol based on out-of-band channel in order to provide certificates to user equipments. We derive bilateral key for personal network’s equipments of the same site and between equipments at remote sites. Concerning the particular case of medical networks, we proposed to cover their deployment phases and their operational phases. This proposal was submitted to the IEEE 802.15.6 working group that conducts research for the standardization of medical networks […]
Kyeongja, Lee Toguyeni Abdoul Karim Armand Rahmani Ahmed. "Modèle global pour la Qualité de Service dans les réseaux de FAI intégration de DiffServ et de l'ingénierie de trafic basée sur MPLS /." Villeneuve d'Ascq : Université des sciences et technologies de Lille, 2008. https://iris.univ-lille1.fr/dspace/handle/1908/1057.
Full textTexte en anglais. Résumé en français et en anglais. Titre provenant de la page de titre du document numérisé. Bibliogr. p. [131]-140.
Mignard, Jean-Pierre. "Cybercriminalité et cyber-répression entre désordre et harmonisation mondiale." Paris 1, 2004. http://www.theses.fr/2004PA010310.
Full textChahine, Rony. "Services multi-fournisseurs et trans-réseaux : mécanismes pour un plan contrôle global, application à un nouveau paradigme de signalisation et aux médiateurs de signalisation /." Paris : École nationale supérieure des télécommunications, 2007. http://catalogue.bnf.fr/ark:/12148/cb41024516r.
Full textChahine, Rony. "Services multi-fournisseurs et trans-réseaux : mécanismes pour un plan contrôle global : application à un nouveau paradigme de signalisation et aux médiateurs de signalisation." Phd thesis, Télécom ParisTech, 2006. http://pastel.archives-ouvertes.fr/pastel-00002128.
Full textMahmoud, Ahmad. "Les cadres juridiques de la responsabilité civile des prestataires techniques." Montpellier 1, 2007. http://www.theses.fr/2007MON10026.
Full textThe concept of civil liability undergoes existential upheaval in the shadow of the evolutions noted in the e-commerce field. The technical service providers are the first actors who enter in direct action with the users of there internet services. They hold technical and factual capacities in the management of the functions of access and lodging. Their legal statute was regulated by the French legislator in order to grant to them an active and substantial role in the fight against the damages and the crimes on the web. Their proximity of the net surfers, and their plausible identification endorse a burden of responsibility naturally to them, that they should had support with other potential actors who seems to be hardly identifiable on the net. This abnormal situation cause interrogations on the equitable flexibility of their responsibility by laying down rather precise conditions as for its realization, particularly about the most adapted legal status for preserving the victims rights of the to spare the proof, as well as the research of the other melting elements of the direct or indirect responsible actors of the Internet. Technical service providers should not be necessarily considered as the only direct authors of the damages undergone by net surfers, but rather the guarantors, policemen and even the “judges” who will be able to finally emit verdicts of labialization better adapted for the fugacious and virtual nature of the data and information flow over the Internet. A private justice pattern regains surface, but this time with its virtual facet which adds to the electronic scenario its natural corollaries of netiquette and auto-regulation, without to disavow in the absolute, enhanced traditional interventionist’s roles of the official sovereign authorities in the laws making and the pronunciation of compensations and penalties
Bregeard, Hervé. "Nouvelles technologies et choix d'une servuction par les clients : une application aux services bancaires." Aix-Marseille 3, 2000. http://www.theses.fr/2000AIX32063.
Full textZohore, Dominique. "L'équilibre contractuel entre fournisseur et utilisateur de services de communications électroniques." Aix-Marseille 3, 2010. http://www.theses.fr/2010AIX32091.
Full textRamanathan, Sakkaravarthi. "Contribution à la résilience des passerelles domestiques." Rennes 1, 2009. http://www.theses.fr/2009REN1S019.
Full textL'architecture haute débits des fournisseurs de services Internet permet de proposer un service « Triple Play » (données, voix et vidéo) au domicile des clients. Au croisement de ces deux zones repose un équipement appelé passerelle résidentielle (RG), qui constitue le système nerveux central permettant de se connecter, de gérer, et de distribuer les différents services aux terminaux à partir de diverses plate-formes. L'une des difficultés à résoudre est la fourniture de ces services avec un niveau élevé de QoS en terme de résilience. Cette thèse débute par l'identification des diverses fautes potentielles qui n'ont pas été détectées durant le cycle de vie des RG. Après l'analyse des spécifications de la phase de conception, nous avons utilisé la technique d'arbre de fautes afin d'identifier celles qui ont engendré des catastrophes chez les clients et ce, en exploitant les données de défaillance issues des tests ou du terrain. La classification et la corrélation de ces fautes nous ont aidé à concevoir un modèle de fautes hiérarchique et fonctionnel mettant en évidence leur impact et leurs conséquences sur les différents services. Dans la couche protocolaire de communication, les fautes s'enchaînent en cascade avec des degrés divers de gravité et se combinent avec d'autres, résultant en défaillances catastrophiques. Afin de minimiser les coupures de services, et d'autres catégories de défaillances, nous avons proposé le renforcement de la robustesse dans l'architecture du RG. Nous avons conçu en outre une architecture tolérante aux fautes, efficace à la fois dans la gestion des fautes et dans la maximisation de la disponibilité. Enfin, pour évaluer les performances des différents prototypes de RG, nous avons élaboré un benchmark en terme de résilience qui permet de souligner les meilleurs choix techniques (fiabilité, sécurité) dans divers environnements opérationnels
FUNKE, Corinna. "Digitization, fast and slow : comparing the creation of digital public services in Denmark, France and Germany." Doctoral thesis, European University Institute, 2022. http://hdl.handle.net/1814/74971.
Full textExamining Board: Prof. Ellen Immergut, (EUI Department of Political and Social Sciences); Prof. Hanspeter Kriesi, (EUI Department of Political and Social Sciences); Prof. Patrick Dunleavy, (London School of Economics, Emeritus); Prof. Michaël Tatham, (University of Bergen)
This thesis deals with the digitization of public services. It seeks to explain why some countries appear to digitize their public service offer at greater speed and with more ease than others, despite similar backgrounds in terms of wealth, IT infrastructure and administrative capacity. For this, the cases of Denmark, France and Germany are compared with respect to their implementation of encompassing, national systems for the provision of citizen-friendly public services online. The time frame under observation roughly covers the years 2000 until the late 2010s. Expert interviews and governmental documents form the basis for the analysis. The dominant administrative culture as well as the politicoadministrative structure that governs responsibility for administrative service provision emerged as the principal forces to explain the speed and success of states’ digitization efforts. A bureaucratic cultural legacy slows down the drive to digitize public services. A decentralized and incoherently organized administrative structure renders digitization more difficult, time-intensive and costly and leads to a disjointed service offer.
Tran, Khanh-Toan. "Efficient complex service deployment in cloud infrastructure." Thesis, Evry-Val d'Essonne, 2013. http://www.theses.fr/2012EVRY0038/document.
Full textThe purpose of the work in this thesis is to provide the Service Provider a solution which is capable of deploying complex services in a cloud automatically and cost-effectively. The first contribution allows the Service Provider to construct complex services requested by the clients from basic services at his disposal. The construction must be efficient in terms of execution time and operation cost while respecting the client’s constraints. We present an analytic model for this problem and propose a heuristic solution which performance is 20-30% better than other approaches. The second contribution solves the problem of deploying the services while considering end-users’ demands. To ensure the quality of services provided to end-users, not only one instance but a set of service replicas is deployed in the network. How the service is duplicated and distributed depends on the demands of its end-users that change constantly in quantity as well as distribution, which complicates the problem. Thus the provisioning mechanism has to be capable of adapt to the change in the network, including the change in end-users’ demands. Our third contribution is a system using OpenStack which allows Service Provider to deploy complex services in a cloud that spans over different locations (multi-site cloud). Given a client’s request, the system automatically calculates the optimal provisioning plan and deploys it while respecting the client’s constraints
Duhen, Willy. "La responsabilité extra-contractuelle du fournisseur d'accès à Internet." Thesis, Aix-Marseille, 2012. http://www.theses.fr/2012AIXM1052.
Full textInternet Service Providers are major actors of the Information Society. They offer connections, controls access points, and can also identify their users. Their many liabilities result from their multiple functions as technical services provider, data controller or performers of judicial orders. These legal obligations are numerous and sometimes overabundant. In spite of an existing and specific liability status, the very notion of "Internet service provider" still remains legally undefined. This lacuna entails a profusion of legal status imposing an ISP status to players for which the main activity is not to provide an Internet connection : Universities, companies, individuals. From then on, criminal, civil and administrative liabilities multiply and create an instable, obscure and even abstruse status. This lexical and legal scattering is even worsened by the functional application of the electronic communications and Information Society legal framework to access providing activities. It is then necessary to unify the legal regimes associated to those activities according to stabilized legal concepts. This reconstruction will inevitably affect the Information Society legal framework as a whole. Eventually, it will open on a possible ground for the electronic communications legal framework
Liu, Jinshan. "Découverte de services sensible à la qualité de service dans les environnements de l'informatique diffuse." Phd thesis, Université de Versailles-Saint Quentin en Yvelines, 2006. http://tel.archives-ouvertes.fr/tel-00469433.
Full textBoulaich, Bayssa Fatima Zahra. "Les prestations financières en ligne." Phd thesis, Université Panthéon-Sorbonne - Paris I, 2012. http://tel.archives-ouvertes.fr/tel-00788560.
Full textKyeongja, Lee. "Modèle global pour la Qualité de Service dans les réseaux de FAI : intégration de DiffServ et de l’ingénierie de trafic basée sur MPLS." Ecole Centrale de Lille, 2006. https://pepite-depot.univ-lille.fr/LIBRE/Th_Num/2006/50376-2006-Kyeongja.pdf.
Full textMultipath routing is a mechanism for load balancing in which the total load is spatially distributed over several paths. It can reduce congestion probability given by routing into the shortest path in the current Internet. LSPs of MPLS provide path controllability by explicit route in the connectionless IP network. Multipath routing scheme is composed of two steps, the selection of multiple candidate paths and the traffic splitting among these selected paths. We compare some recent multipath routing algorithms based on MPLS on the point of scalability and stability. Among them, we pick up WDP and LDM for our hybrid approach which combines cross-steps of different algorithms. PER algorithm is proposed in the improvement of LDM’s traffic splitting step. Using LDM, WDP and PER, three hybrid QoS algorithms are made. Their performances are proved by simulation that they, especially LBWDP (Load Balancing over Widest Disjoint Paths), are more effective than LDM or MATE. For better QoS guarantee, we integrate DiffServ with our traffic engineering technique (DiffServ-aware MPLS Traffic Engineering : DS-TE). PEMS (PEriodic Multi-Step algorithm in DS-TE network) is proposed as one DS-TE model to differentiate the quality of service according to the class. For PEMS algorithm, we propose a new algorithm to select candidate paths by proper metric of each traffic class. PER algorithm distributes the traffic among its own candidate paths by dynamic metric of requested class. Simulation results using ns-2 showed that PEMS can balance the load less than LBWDP but EF and AF classes can be ensured of the better quality of service than LBWDP
Duhaut, Nicolas. "Nouvelles technologies de l'information et de la communication et modernisation du service public : les relations administratives dans la branche Famille de la Sécurité sociale." Bordeaux 3, 2005. http://www.theses.fr/2005BOR30012.
Full textMichon, Etienne. "Allocation dynamique sur cloud IaaS : allocation dynamique d’infrastructure de SI sur plateforme de cloud avec maîtrise du compromis coûts/performances." Thesis, Strasbourg, 2015. http://www.theses.fr/2015STRAD014/document.
Full textIn the field of cloud computing, IaaS provide virtualized on-demand computing resources on a pay-per-use model. From the user point of view, the cloud provides an inexhaustible supply of resources, which can be dynamically claimed and released. IaaS is especially useful to execute scientific computations using operating budget instead of using a big initial investment. Provisioning the resources depending on the workload is an important challenge, especially regarding the big number of jobs and resoruces to take into account, but also the large amount of available platforms and economic model. We advocate the need for brokers on the client-side with two main capabilities: (1) automate the provisioning depending on the strategy selected by the user and (2) able to simulate an execution in order to provide the user with an estimation of the costs and times of his workload's execution. Many provisioning strategies and cloud providers can be used in this broker thanks to its open architecture. Large scale experiments have been conducted on many cloud platforms and show our tool's ability to execute different kind of workloads on various platforms and to simulate these executions with high accuracy
Yu, Bo. "Les obligations des intermédiaires de l'Internet en matière de propriété intellectuelle en Chine." Thesis, Aix-Marseille, 2015. http://www.theses.fr/2015AIXM1014.
Full textIntellectual property is one of fundamental rights. By developing and applying the objective value order theory, the internet intermediaries should assume the obligation to actively protect the intellectual property. Meanwhile, as shared obligations distributed among the government, the right holder, the internet intermediaries, and the user, the active obligation of IP protection that the internet intermediaries can carry out is limited. In order to insure the moderation of obligation, it would be preferable to respect the pertinent legal and economic principles, and distinguish the target of dissemination, the business model, and the profit factor in choosing the type of obligations. It should be noted that this active protection would not be accomplished only through a unique obligation. It should articulate several types of obligation, including but not limited to filtering obligation. These obligations, all together, form an obligation system which enables internet intermediaries to actively protect intellectual property
Li, Yanhuang. "Interoperability and Negotiation of Security Policies." Thesis, Télécom Bretagne, 2016. http://www.theses.fr/2016TELB0414/document.
Full textSecurity policy provides a way to define the constraints on behavior of the members belonging to a system, organization or other entities. With the development of IT technology such as Grid Computing and Cloud Computing, more and more applications and platforms exchange their data and services for cooperating. Toward this trend, security becomes an important issue and security policy has to be applied in order to ensure the safety of data and service interaction. In this thesis, we deal with one type of security policy: access control policy. Access control policy protects the privileges of resource's utilization and there exist different policy models for various scenarios. Our goal is to ensure that the service customer well expresses her security requirements and chooses the service providers that fit these requirements.The first part of this dissertation is dedicated to service provider selection. In case that the security policies of the service provider are accessible to the service customer, we provide a method for measuring the similarity between security policies. Another case is that security policies are not accessible to the service customer or not specified explicitly. Our solution is proposing a policy-based framework which enables the derivation from attribute-based security requirements to concrete security policies. The second part of the dissertation focuses on the security policy negotiation. We investigate the process of reaching agreement through bargaining process in which negotiators exchange their offers and counter offers step by step. The positive result of the negotiation generates a policy contract
Bili, Anne-Briac. "La place de la télémédecine à domicile dans lʼorganisation du système de santé en France." Phd thesis, Université Rennes 2, 2012. http://tel.archives-ouvertes.fr/tel-00663358.
Full textAbdallah, Raed. "Intelligent crime detection and behavioral pattern mining : a comprehensive study." Electronic Thesis or Diss., Université Paris Cité, 2023. http://www.theses.fr/2023UNIP7031.
Full textIn the face of a rapidly evolving criminal landscape, law enforcement agencies (LEAs) grapple with escalating challenges in contemporary criminal investigations. This PhD thesis embarks on a transformative exploration, encouraged by an urgent need to revolutionize investigative methodologies and arm LEAs with state-of-the-art tools to combat crime effectively. Rooted in this imperative motivation, the research meticulously navigates diverse data sources, including the intricate web of social media networks, omnipresent video surveillance systems, and expansive online platforms, recognizing their fundamental roles in modern crime detection. The contextual backdrop of this research is the pressing demand to empower LEAs with advanced capabilities in intelligent crime detection. The surge in digital interactions necessitates a paradigm shift, compelling researchers to delve deep into the labyrinth of social media, surveillance footage, and online data. This context underscores the urgency to fortify law enforcement strategies with cutting-edge technological solutions. Motivated by urgency, the thesis focuses on three core objectives: firstly, automating suspect identification through the integration of data science, big data tools, and ontological models, streamlining investigations and empowering law enforcement with advanced inference rules; secondly, enabling real-time detection of criminal events within digital noise via intricate ontological models and advanced inference rules, providing actionable intelligence and supporting informed decision-making for law enforcement; and thirdly, enhancing video surveillance by integrating advanced deep learning algorithms for swift and precise detection of knife-related crimes, representing a pioneering advancement in video surveillance technology. Navigating this research terrain poses significant challenges. The integration of heterogeneous data demands robust preprocessing techniques, enabling the harmonious fusion of disparate data types. Real-time analysis of social media intricacies necessitates ontological models adept at discerning subtle criminal nuances within the digital tapestry. Moreover, designing Smart Video Surveillance Systems necessitates the fusion of state-of-the-art deep learning algorithms with real-time video processing, ensuring both speed and precision in crime detection. Against these challenges, the thesis contributes innovative solutions at the forefront of contemporary crime detection technology. The research introduces ICAD, an advanced framework automating suspect identification and revolutionizing investigations. CRI-MEDIA tackles social media crime challenges using a streamlined process and enriched criminal ontology. Additionally, SVSS, a Smart Video Surveillance System, swiftly detects knife-related crimes, enhancing public safety. Integrating ICAD, CRI-MEDIA, and SVSS, this work pioneers intelligent crime detection, empowering law enforcement with unprecedented capabilities in the digital age. Critical to the integrity of the research, the proposed methodologies undergo rigorous experimentation in authentic criminal scenarios. Real-world data gathered from actual investigations form the crucible wherein ICAD, CRI-MEDIA, and SVSS are tested. These experiments serve as a litmus test, affirming not only the viability of the proposed solutions but also offering nuanced insights for further refinement. The results underscore the practical applicability of these methodologies, their adaptability in diverse law enforcement contexts, and their role in enhancing public safety and security
Brie, Guillaume. "Traitement social de la criminalité sexuelle pédophile : rapports de pouvoir et lutte des représentations entre agents chargés du contrôle et condamnés." Thesis, Paris 10, 2012. http://www.theses.fr/2012PA100108.
Full textSexual violence on children lead more and more men in prison. Institutional responses to these questions are strongly reminiscent of the indignity that affects those people: heaviness of the sentences, surveillance and preventive detention for example. Based on data from an empirical research, I wish to understand how modern society is organized in relation to such behavior. The field work mainly takes place through interviews. First with prisoners convicted for those facts.And then with detention officers (psychologists, psychiatrists, councilors of rehabilitation and probation, supervisors, judge of the sanctions application). Finally with agents responsible of repression: specialized Gendarmes on the hearings of juvenile victims (prevention squad) and specialized investigators Gendarmes on the hunt of "pedophiles" on the Internet (Territorial and Research Brigade).The analysis of obtained speeches allows to identify the processes that co-construct the plurality of viewpoints. And to understand how power relations are constituted around the question of sexual violence behaviors on children today. To the results, it appears a struggle between different representations of agents met and the convicted around the profile of "pedophile".The analyzes of these mutual perceptions permits to explain, in particular, how the strength of the devices support of the condemned affects their ability to act and initiates in them, a deep desire to enter the space of legitimate and the "normal"
Tembo, Mouafo Serge Romaric. "Applications de l'intelligence artificielle à la détection et l'isolation de pannes multiples dans un réseau de télécommunications." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0004/document.
Full textTelecommunication networks must be reliable and robust to ensure high availability of services. Operators are currently searching to automate as much as possible, complex network management operations such as fault diagnosis.In this thesis we are focused on self-diagnosis of failures in the optical access networks of the operator Orange. The diagnostic tool used up to now, called DELC, is an expert system based on decision rules. This system is efficient but difficult to maintain due in particular to the very large volume of information to analyze. It is also impossible to have a rule for each possible fault configuration, so that some faults are currently not diagnosed.We proposed in this thesis a new approach. In our approach, the diagnosis of the root causes of malfunctions and alarms is based on a Bayesian network probabilistic model of dependency relationships between the different alarms, counters, intermediate faults and root causes at the level of the various network component. This probabilistic model has been designed in a modular way, so as to be able to evolve in case of modification of the physical architecture of the network. Self-diagnosis of the root causes of malfunctions and alarms is made by inference in the Bayesian network model of the state of the nodes not observed in view of observations (counters, alarms, etc.) collected on the operator's network. The structure of the Bayesian network, as well as the order of magnitude of the probabilistic parameters of this model, were determined by integrating in the model the expert knowledge of the diagnostic experts on this segment of the network. The analysis of thousands of cases of fault diagnosis allowed to fine-tune the probabilistic parameters of the model thanks to an Expectation Maximization algorithm. The performance of the developed probabilistic tool, named PANDA, was evaluated over two months of fault diagnosis in Orange's GPON-FTTH network in July-August 2015. In most cases, the new system, PANDA, and the system in production, DELC, make an identical diagnosis. However, a number of cases are not diagnosed by DELC but are correctly diagnosed by PANDA. The cases for which self-diagnosis results of the two systems are different were evaluated manually, which made it possible to demonstrate in each of these cases the relevance of the decisions taken by PANDA
AMIGO, Maria Isabel. "Aspects technologiques et économiques de la qualité de service dans les alliances de fournisseurs de services." Phd thesis, 2013. http://tel.archives-ouvertes.fr/tel-00980715.
Full text