Academic literature on the topic 'Gestion des identités et des accès'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Gestion des identités et des accès.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Gestion des identités et des accès"
Ndamiyehe Ncutirakiza, Jean-Baptiste, Philippe Lejeune, Sylvie Gourrlet-Fleury, Adeline Fayolle, Léopold Ndjele Mianda-Bungi, and Gauthier Ligot. "Quantifier les dimensions des houppiers à l’aide d’images aériennes à haute résolution pour estimer l’accroissement diamétrique des arbres dans les forêts d’Afrique centrale." BOIS & FORETS DES TROPIQUES 343 (March 27, 2020): 67–81. http://dx.doi.org/10.19182/bft2020.343.a31848.
Full textIssoufa, Idrissa, Morou boubé, Abdoulaye Diouf, Saley Karim, and Ali Mahamane. "Caractérisation des pâturages herbacés sahéliens à accès limité : Cas du Centre Secondaire de Multiplication de Bétail de Sayam (Diffa)." Journal of Applied Biosciences 156 (December 26, 2020): 16095–113. http://dx.doi.org/10.35759/jabs.156.4.
Full textOllier-Malaterre, Ariane. "La compétence numérique de gestion des frontières sur les réseaux sociaux numériques : un capital culturel technologique à la Bourdieu." Section 2 – Les nouveaux espaces et les nouvelles temporalités : flexibilisation, invisibilité et brouillage des frontières, no. 81 (February 19, 2019): 121–37. http://dx.doi.org/10.7202/1056307ar.
Full textGallet, Sébastien. "Combiner tourisme et conservation patrimoniale." Téoros 29, no. 2 (April 25, 2014): 139–46. http://dx.doi.org/10.7202/1024880ar.
Full textHébert, Billy, Line Chamberland, and Mickael Chacha Enriquez. "Les aîné-es trans : une population émergente ayant des besoins spécifiques en soins de santé, en services sociaux et en soins liés au vieillissement." Articles 25, no. 1 (August 30, 2013): 57–81. http://dx.doi.org/10.7202/1018231ar.
Full textRea, Andrea. "La politique d’intégration des immigrés et la fragmentation des identités. Le modèle belge à l’épreuve de la crise économique et de la fédéralisation de l’État." II. Le contexte d’accueil : inclusion, exclusion et métissage, no. 31 (October 22, 2015): 81–92. http://dx.doi.org/10.7202/1033780ar.
Full textChicha, Marie-Thérèse, and Éric Charest. "Accès à l'égalité et gestion de la diversité : une jonction indispensable." Gestion 34, no. 3 (2009): 66. http://dx.doi.org/10.3917/riges.343.0066.
Full textBIDEUX, Gilles, and Bertrand VANDEN BOSSCHE. "Comment les jumeaux numériques vont révolutionner la gestion patrimoniale des usines." TSM 12 2023, TSM 12 2023 (December 20, 2023): 35–39. http://dx.doi.org/10.36904/tsm/202312035.
Full textBarrère, Christian. "La politique de la concurrence dans les réseaux : le cas du transport ferroviaire." Économie appliquée 51, no. 3 (1998): 37–75. http://dx.doi.org/10.3406/ecoap.1998.1667.
Full textDeclercq, Karolien. "Une ethnographie sociolinguistique de deux classes multiculturelles à Bruxelles." Diversité 151, no. 1 (2007): 61–67. http://dx.doi.org/10.3406/diver.2007.2824.
Full textDissertations / Theses on the topic "Gestion des identités et des accès"
Diop, Mamadou Abdoulaye. "Analyse haute performance de masses de données; application à la détection d'anomalie dans le contexte de la gestion d'identité et d'accès." Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG100.
Full textData protection is a critical issue in cybersecurity. Organizations use identity and access management software and traditional cybersecurity tools to protect their information assets from external threats. However, they most often lack solutions to counter insider threats from individuals with legitimate access to corporate information systems. This type of threat is now the primary concern of cybersecurity specialists. User and entity behavior analysis software are the tools used by cyber specialists to counter insider threats effectively. However, existing solutions can present problems such as many false alarms and a consequent development time of detection models when the activity data is of large volumes.This thesis aims to remedy these problems by proposing an algorithmic solution and its efficient implementation for high performance architectures. More precisely, we propose a detection method that builds behavioral profilers using techniques from the fields of machine learning, linear algebra and high performance computing. This method is defined by application of “unite and conquer” approach, used in linear algebra, to ensemble learning techniques. We integrate innovative methods of PageRank and autoencode in the proposed ensemble method in addition to the classical basic machine learning methods.According to our experiments, this new method of insider threat detection shows an average efficiency in terms of detection accuracy, up to 98% of AUC. This is a significant increase compared to base methods. We also propose an implementation of this method according to several parallel programming paradigms allowing us to obtain a speedup up to 10.We have integrated this software platform with data preprocessing means and an alarm system into a global module for insider threat detection, capable of extending cybersecurity tools
Chanton, Olivier. "Stratégies de gestion des identités et influence sociale." Paris 10, 1999. http://www.theses.fr/1999PA100120.
Full textNasser, Ali Djambae. "Accès aux soins et gestion des flux migratoires." Thesis, Normandie, 2018. http://www.theses.fr/2018NORMR050.
Full textMayotte a French overseas department since 2011, is part of the comorian archipelago from which it was separated from the State of Union of the Comoros islands since 1975. The introduction of a visa in 1995 and the order n° 2002-688 delivered on 12 july 2004 and entered into force on April 1st 2005 with regard to the extension of social security in Mayotte exclude the foreign sick from Mayotte's health system. This leads to a process of medical evacuation following an illegal immigration way that causes shipwrecks and the violation of the patient's rights. The attraction of Mayotte and Mainland France for disadvantaged populations lead to conflict situations and competition in the access to health and social protection. Mayotte's disadvantaged populations, who are struggling to catch up with the mainland, do not get along with that competition. At the same time the illegal immigrants living clandestinely and with the threat of expulsion are facing difficulties to assert their right to health care and to benefit from social system assistance. Obstacles are numerous and most of the time considerable, mainly because of discrimination, because of their judicial status, of disparity in their social and economical difficulties and because of their generaly very hard living conditions. The control of migratory flow and the fight against illegal immigrant remain the top priorities of the French government policy as far as immigration is concerned. The singularity of the situation in the department of Mayotte and the huge migratory flows that have been observed led healthcare authorities to handle migratory movements related to illegal medical evacuations. France has a healthcare policy and continues to support the Union of Comoros in the effort to improve healthcare access and quality, through support programs to health sector. These programs aim at improving the health of mothers and children, mainly in reducing maternal mortality. Through its organisation AFD, France aims at supporting health ministry in elaborating and implementing public policies and helping comorian state to put in place regulatory mechanisms of a private service within public sector and to reform the national pharmacy. This work focus on the issues related to the right to social protection and the health law for foreigners on the national territory, in mainland France and in Mayotte as well. Diversity of national laws applicable in Mayotte is a significant barrier to local devices in terms of medical and social assistance. It is necessary to seek legal solutions related to standardization of this health and social law in order to better the healthcare system. During our field research we observed that local devices such as the "pink warrant" and the "good AGD" are not at all equivalent to the national devices (AME and CMUc)
Soenen, Guillaume. "Identités organisationnelles et communautés de pratique : Le cas d'une société de conseil." Jouy-en Josas, HEC, 2006. http://www.theses.fr/2006EHEC0014.
Full textThis thesis deals with organizational learning, and more specifically with learning organizations. I mobilize the concept of organizational identity and focuses on a specific mode of organizing: intra-organizational communities of practice. First, I develop a model conceptualizing organizational identity as a system composed of five interacting facets. Second, I articulate a renewed definition of communities of practice as collective answers to prescription failures. A quantitative study of four communities of practice allows the establishment of a link between membership into a community and individuals' preference for certain sources of knowledge. This result confirms that communities of practice are more than a mere linguistic formula and are a distinct psycho-sociological reality. In a third phase, a comparative study is used to reveal the factors which contribute to this specific form of social network that can be defined as an “organizational mousse”
Bah, Abdramane. "Interopérabilité et sécurité des systèmes d'information : application aux systèmes de gestion de l'éducation." Thesis, Nantes, 2020. http://www.theses.fr/2020NANT4028.
Full textAccess control for shared services is an essential requirement for a federation of services from different domains. In this thesis, we tackled two access control problems : authorizing users and delegating user authentication to their own domains. To address these problems, we have proposed a method of authorizing users based on the attribute mapping technique and a federated access control mechanism to implement this authorization method. We have proposed a service federation method to delegate user authentication to their domains. The main objective is to allow various domains to collaborate despite the heterogeneity of their security models
Ates, Mikaël. "Identités numériques : gestion inter-organisationnelle centrée sur l'utilisateur et respectueuse de la vie privée." Phd thesis, Université Jean Monnet - Saint-Etienne, 2009. http://tel.archives-ouvertes.fr/tel-00443910.
Full textBenjelloun, Mohamed Amine. ""Don et anonymat : la question des identités"." Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM5032/document.
Full textThrough our practice of child psychiatry and confronted with the lived of families concerned with the question of gametes or organs donation, it seems that numerous aporia related to donation and anonymity experiences have not been considered by medicine. If donation and anonymity have been central to medicine to the point that they have become principles, they have never been subjects of education or profound reflection. Philosophy and literature also bring some possible answers. Donation is a present without the presence, carrying with itself some abandonment, without reason, to someone who doesn't ask for anything, precisely because he would not know that he was given something. Anonymity gives an opportunity to fade away, just to be able to meet the other, closer. This obliteration starts from the very beginning. It aims at any founding trace, in order, paradoxically to allow the subject to approach in wandering and doubt a possible encounter with the unknown and the outside, far from an otherness that be only would be radical.Finally, the issue of organ donation, of gamete donation, of anonymity, forces us to rethink simultaneously the question of relationship and identity. The donor and recipient, meet and are necessarily immersed in the other's time: how to build a sphere for oneself and a sphere for the other, an intersubjectivity which would enable the communication between materials of different origin? How to recognize ego and alter, as ipseities? Concepts of narrative identity, entangled stories allow to pass over the question of anonymity. Anonymity would then protect identity. And better still, would allow for an ethical recognition to happen
Aḵẖtar, Salīm. "Evaluation de la capacité et gestion des ressources radio pour système AMRC de troisième génération." Paris, ENST, 2001. http://www.theses.fr/2001ENST0021.
Full textTurgeon-Pelchat, Catherine. "La mer à boire : accès à la ressource et gestion des pêches à St. Paul's River." Thesis, Université Laval, 2011. http://www.theses.ulaval.ca/2011/27932/27932.pdf.
Full textZonou, Bienvenu. "Interactions entre problématiques foncières et identités socio-territoriales dans l'Ouest du Burkina Faso." Toulouse 2, 2008. https://tel.archives-ouvertes.fr/tel-01295009.
Full textThis paper shows what is now at stake for land management in the Burkina Faso. An extensive fieldwork allows us to suggest three ways to consider the land question, to prospect for giving security to the land. Three villages in western Burkina Faso have been analysed, chronologicaly, to show the progress changes and take into account the identity question. Indeed, the agro-ecological factors make western Burkina Faso a much appealing zone, at nation scale, for its agricultural potentialities. The growing migration phenomenon contributes to the rarefaction of available land. The growing appraisal of those territories, the evolution of production systems, land planning, popularization new techniques, commercial crops development; exchanges monetization have contributed to the land rarefaction. Interactions between migration, production system changes, new social and territorial identities lead to a much more complex land management system. The actors'strategies, in order to reach and appropriate land, is a vivid sign of the social and territorial reorganizations connected to the land rarefaction in these villages. Thus we ask questions about resource sustainable management and civil peace guaranty. From this set of information, our paper brings the local land management variety and peculiarity modes. The historical aspects, the local scale and an interdisciplinary approach are essential. The identity question constitutes a novel approach in this work and an interesting contribution to demography-land, production-land relationship. It shows the social dynamics at work beyond the triptych "man-space-resources"
Books on the topic "Gestion des identités et des accès"
(Organization), EDAL 2000. Femme et développement: La micro-finance au Bénin, accès et gestion. [Cotonou]: Editions Ruisseaux d'Afrique, 2001.
Find full textBoard, Canada Treasury. Information and administrative management: Access to information = Gestion de l'information et gestion administrative : accès à l'information. [Ottawa]: Treasury Board of Canada, 1993.
Find full textBook chapters on the topic "Gestion des identités et des accès"
Dumas, Geneviève. "Le livre de mémoires des notaires Bertrand Paul (1397-1400) et Jean du Pin (1401-1419) : gestion documentaire et mémoire urbaine." In Les identités urbaines au Moyen Âge. Regards sur les villes du Midi français, 81–92. Turnhout: Brepols Publishers, 2014. http://dx.doi.org/10.1484/m.seuh-eb.5.101523.
Full textMENDIBOURE, Léo, Mohamed-Aymen CHALOUF, and Francine KRIEF. "Gestion dynamique des identités et des accès dans l’IoT : une approche basée sur la blockchain." In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 231–50. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch9.
Full textMassicard, Élise. "Chapitre 3 / Modes de gestion des identités dans et par les partis politiques en Turquie." In Identités et politique, 93–116. Presses de Sciences Po, 2014. http://dx.doi.org/10.3917/scpo.dorro.2014.01.0093.
Full textSEMMOUD, Abderrazaq, and Badr BENMAMMAR. "La sécurité intelligente des réseaux informatiques." In Gestion et contrôle intelligents des réseaux, 5–28. ISTE Group, 2020. http://dx.doi.org/10.51926/iste.9008.ch1.
Full textBOUSSEN, Sinda, Mohamed-Aymen CHALOUF, and Francine KRIEF. "Sélection multicritère des paramètres de transmission dans l’IoT." In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 1–26. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch1.
Full textMONNET, Anne-Christine, Thomas HAEVERMANS, Anne-Sophie ARCHAMBEAU, Philippe GRANDCOLAS, and Roseli PELLENS. "Utilisation des grands jeux de données naturalistes pour répondre aux enjeux scientifiques et sociétaux actuels." In Les collections naturalistes dans la science du XXIe siècle, 289–310. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9049.ch18.
Full textMathonnat, Jacky. "54. Systèmes de santé et accès aux soins dans les pays à faible revenu." In Traité d'économie et de gestion de la santé, 494–504. Presses de Sciences Po, 2009. http://dx.doi.org/10.3917/scpo.bras.2009.01.494.
Full textVEMULAPADU, Ajey balaji. "Former les traducteurs en pharmacovigilance par le système de parrainage." In Médier entre langues, cultures et identités : enjeux, outils, stratégies, 93–98. Editions des archives contemporaines, 2022. http://dx.doi.org/10.17184/eac.5505.
Full textHADJADJ-AOUL, Yassine, and Soraya AIT-CHELLOUCHE. "Utilisation de l’apprentissage par renforcement pour la gestion des accès massifs dans les réseaux NB-IoT." In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 27–55. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch2.
Full textOmrane, Mustapha. "Accès à la terre et gestion foncière dans les Hautes Terres malgaches : pratiques coutumières et logique de sécurisation des droits." In Law, land use and the environment: Afro-Indian dialogues, 257–82. Institut Français de Pondichéry, 2008. http://dx.doi.org/10.4000/books.ifp.3908.
Full textReports on the topic "Gestion des identités et des accès"
Dufour, Quentin, David Pontille, and Didier Torny. Contracter à l’heure de la publication en accès ouvert. Une analyse systématique des accords transformants. Ministère de l'enseignement supérieur et de la recherche, April 2021. http://dx.doi.org/10.52949/2.
Full textCatherine, Hugo. Étude comparative des services nationaux de données de recherche Facteurs de réussite. Ministère de l'enseignement supérieur et de la recherche, January 2021. http://dx.doi.org/10.52949/6.
Full textGestion de la pandémie de COVID-19 - Analyse de la dotation en personnel dans les centres d'hébergement de soins de longue durée du Québec au cours de la première vague. CIRANO, June 2023. http://dx.doi.org/10.54932/fupo1664.
Full text