Academic literature on the topic 'Informatique nuage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Informatique nuage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Informatique nuage"
Guillot, Philippe, and Marie-José Durand-Richard. "Informatique et cryptologie : un déplacement des frontières." Intellectica. Revue de l'Association pour la Recherche Cognitive 72, no. 1 (2020): 141–57. http://dx.doi.org/10.3406/intel.2020.1950.
Full textBarrat, Olivier. "Informatique en nuage : mettez de côté le PATRIOT Act, penchez-vous sur FISAA !" Sécurité et stratégie 14, no. 3 (2013): 64. http://dx.doi.org/10.3917/sestr.014.0064.
Full textSobczak, Anna. "Public Cloud Archives: Dream or Reality? / Les archives publiques dans le nuage informatique: Rêve ou réalité ?" Canadian Journal of Information and Library Science 39, no. 2 (2015): 228–34. http://dx.doi.org/10.1353/ils.2015.0014.
Full textFranks, Patricia C. "New Technologies, New Challenges: Records Retention and Disposition in a Cloud Environment / Nouvelles technologies, nouveaux défis: Conservation et déclassement des documents dans un environnement de nuage informatique." Canadian Journal of Information and Library Science 39, no. 2 (2015): 191–209. http://dx.doi.org/10.1353/ils.2015.0011.
Full textZins, Marie, Marc Cuggia, and Marcel Goldberg. "Les données de santé en France." médecine/sciences 37, no. 2 (February 2021): 179–84. http://dx.doi.org/10.1051/medsci/2021001.
Full textHintermann, Francis. "Informatique : la révolution des nuages." L'Expansion Management Review N° 139, no. 4 (2010): 98. http://dx.doi.org/10.3917/emr.139.0098.
Full textStancic, Hrvoje, Arian Rajh, and Hrvoje Brzica. "Archival Cloud Services: Portability, Continuity, and Sustainability Aspects of Long-term Preservation of Electronically Signed Records / Les services d’archivage dans un nuage informatique : Portabilité, continuité et durabilité: Aspects de la conservation à long terme des documents signés électroniquement." Canadian Journal of Information and Library Science 39, no. 2 (2015): 210–27. http://dx.doi.org/10.1353/ils.2015.0012.
Full textCaron, Daniel J., and Richard G. Brown. "Des grottes de Lascaux aux nuages de Google : le bouleversement des systèmes de l’écrit et son incidence sur le fonctionnement de nos institutions démocratiques." Télescope 18, no. 1-2 (May 29, 2012): 155–67. http://dx.doi.org/10.7202/1009261ar.
Full textVanderburgh, David. "Breast cancer screening." Politics and the Life Sciences 37, no. 1 (2018): 135–40. http://dx.doi.org/10.1017/pls.2018.3.
Full textRoyer, Michael F., and Christopher Wharton. "The Design and Testing of a Text Message for Use as an Informational Nudge in a Novel Food Insecurity Intervention." Challenges 14, no. 4 (October 1, 2023): 40. http://dx.doi.org/10.3390/challe14040040.
Full textDissertations / Theses on the topic "Informatique nuage"
Degoutin, Stéphane. "Société-nuage." Thesis, Paris Est, 2019. http://www.theses.fr/2019PESC1009.
Full textThis book unfolds, like a Chinese landscape painting through which the viewer’s gaze wanders slowly. I describe a panorama. It is not made of mountains in the mist or bushes swept by the wind, but of data centers, automated warehouses, social network feeds...I explore the hypothesis that the Internet is part of a general process that reduces society and materials to small-scale components, which allow its mechanisms to become more fluid. A chemist’s idea – the decomposition of matter into powder to facilitate its recomposition – is also applied to social relations, memory and humans in general.Just as the reduction of matter accelerates chemical reactions, the reduction of society to powder allows for an accelerated decomposition and recomposition of all from which humans are made. It allows to multiply the reactions within society, to accelerate the productions of humanity and the social chemistry : combination of human passions (Charles Fourier), hyperfragmentation of work (Mechanical Turk), decomposition of knowledge (Paul Otlet), Internet of neurons (Michael Chorost), agregation of micro affects (Facebook). This is what I call the « society as cloud »
Etchevers, Xavier. "Déploiement d'applications patrimoniales en environnements de type informatique dans le nuage." Phd thesis, Université de Grenoble, 2012. http://tel.archives-ouvertes.fr/tel-00875559.
Full textEtchevers, Xavier. "Déploiement d’applications patrimoniales en environnements de type informatique dans le nuage." Thesis, Grenoble, 2012. http://www.theses.fr/2012GRENM100/document.
Full textCloud computing aims to cut down on the outlay and operational expenses involved in setting up and running applications. To do this, an application is split into a set of virtualized hardware and software resources. This virtualized application can be autonomously managed, making it responsive to the dynamic changes affecting its running environment. This is referred to as Application Life-cycle Management (ALM). In cloud computing, ALM is a growing but immature market, with many offers claiming to significantly improve productivity. However, all these solutions are faced with a major restriction: the duality between the level of autonomy they offer and the type of applications they can handle. To address this, this thesis focuses on managing the initial deployment of an application to demonstrate that the duality is artificial. The main contributions of this work are presented in a platform named VAMP (Virtual Applications Management Platform). VAMP can deploy any legacy application distributed in the cloud, in an autonomous, generic and reliable way. It consists of: • a component-based model to describe the elements making up an application and their projection on the running infrastructure, as well as the dependencies binding them in the applicative architecture; • an asynchronous, distributed and reliable protocol for self-configuration and self-activation of the application; • mechanisms ensuring the reliability of the VAMP system itself. Beyond implementing the solution, the most critical aspects of running VAMP have been formally verified using model checking tools. A validation step was also used to demonstrate the genericity of the proposal through various real-life implementations
Gadhgadhi, Ridha. "Openicra : vers un modèle générique de déploiement automatisé des applications dans le nuage informatique." Mémoire, École de technologie supérieure, 2013. http://espace.etsmtl.ca/1222/1/GADHGADHI_Ridha.pdf.
Full textLejemble, Thibault. "Analyse multi-échelle de nuage de points." Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30184.
Full text3D acquisition techniques like photogrammetry and laser scanning are commonly used in numerous fields such as reverse engineering, archeology, robotics and urban planning. The main objective is to get virtual versions of real objects in order to visualize, analyze and process them easily. Acquisition techniques become more and more powerful and affordable which creates important needs to process efficiently the resulting various and massive 3D data. Data are usually obtained in the form of unstructured 3D point cloud sampling the scanned surface. Traditional signal processing methods cannot be directly applied due to the lack of spatial parametrization. Points are only represented by their 3D coordinates without any particular order. This thesis focuses on the notion of scale of analysis defined by the size of the neighborhood used to locally characterize the point-sampled surface. The analysis at different scales enables to consider various shapes which increases the analysis pertinence and the robustness to acquired data imperfections. We first present some theoretical and practical results on curvature estimation adapted to a multi-scale and multi-resolution representation of point clouds. They are used to develop multi-scale algorithms for the recognition of planar and anisotropic shapes such as cylinders and feature curves. Finally, we propose to compute a global 2D parametrization of the underlying surface directly from the 3D unstructured point cloud
Malvault, Willy. "Vers une architecture pair-à-pair pour l'informatique dans le nuage." Phd thesis, Université de Grenoble, 2011. http://tel.archives-ouvertes.fr/tel-00633787.
Full textGuesmi, Asma. "Spécification et analyse formelles des politiques de sécurité dans un processus de courtage de l'informatique en nuage." Thesis, Orléans, 2016. http://www.theses.fr/2016ORLE2010/document.
Full textThe number of cloud offerings increases rapidly. Therefore, it is difficult for clients to select the adequate cloud providers which fit their needs. In this thesis, we introduce a cloud service brokerage mechanism that considers the client security requirements. We consider two types of the client requirements. The amount of resources is represented by the functional requirements. The non-functional requirements consist on security properties and placement constraints. The requirements and the offers are specified using the Alloy language. To eliminate inner conflicts within customers requirements, and to match the cloud providers offers with these customers requirements, we use a formal analysis tool: Alloy. The broker uses a matching algorithm to place the required resources in the adequate cloud providers, in a way that fulfills all customer requirements, including security properties. The broker checks that the placement configuration ensures all the security requirements. All these steps are done before the resources deployment in the cloud computing. This allows to detect the conflicts and errors in the clients requirements, thus resources vulnerabilities can be avoided after the deployment
Alvares, De Oliveira Junior Frederico. "Gestion multi autonome pour l'optimisation de la consommation énergétique sur les infrastructures en nuage." Phd thesis, Université de Nantes, 2013. http://tel.archives-ouvertes.fr/tel-00853575.
Full textCostache, Stefania. "Gestion autonome des ressources et des applications dans un nuage informatique selon une approche fondée sur un marché." Phd thesis, Université Rennes 1, 2013. http://tel.archives-ouvertes.fr/tel-00925352.
Full textDemir, Levent. "Module de confiance pour externalisation de données dans le Cloud." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM083/document.
Full textData outsourcing to the Cloud has led to new security threats. The main concerns of this thesis are to protect the user data and privacy. In particular, it follows two principles : to decrease the necessary amount of trust towards the Cloud, and to design an architecture based on a trusted module between the Cloud and the clients. Both principles are derived from a new design approach : "Trust The Module, Not The Cloud ".Gathering all the cryptographic operations in a dedicated module allows several advantages : a liberation from internal and external attacks on client side ; the limitation of software to the essential needs offers a better control of the system ; using co-processors for cryptographic operations leads to higher performance.The thesis work is structured into three main sections. In the first section , we confront challenges of a personal Cloud, designed to protect the users’ data and based on a common and cheap single-board computer. The architecture relies on two main foundations : a transparent encryption scheme based on Full Disk Encryption (FDE), initially used for local encryption (e.g., hard disks), and a transparent distribution method that works through iSCSI network protocol in order to outsource containers in Cloud.In the second section we deal with the performance issue related to FDE. By analysing the XTS-AES mode of encryption, the Linux kernel module dm-crypt and the cryptographic co-processors, we introduce a new approach called extReq which extends the cryptographic requests sent to the co-processors. This optimisation has doubled the encryption and decryption throughput.In the final third section we establish a Cloud for enterprises based on a more powerful and certified Hardware Security Module (HSM) which is dedicated to data encryption and keys protection. Based on the TTM architecture, we added "on-the-shelf" features to provide a solution for enterprise
Books on the topic "Informatique nuage"
Sauveur, Paula. La protection du secret commercial dans les nuages publics de l'infonuagique (cloud computing). Cowansville, Québec: Éditions Y. Blais, 2013.
Find full textLin, Simon C., and Eric Yen. Managed grids and cloud systems in the Asia-Pacific research community. New York: Springer, 2010.
Find full textInternational Workshop on Grid Economics and Business Models (7th 2010 Ischia, Italy). Economics of grids, clouds, systems, and services: 7th international workshop, GECON 2010, Ischia, Italy, August 31, 2010 : proceedings. Berlin: Springer, 2010.
Find full textCloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O'Reilly, 2009.
Find full textCloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O'Reilly, 2009.
Find full textLin, Simon C., and Eric Yen. Managed Grids and Cloud Systems in the Asia-Pacific Research Community. Springer, 2014.
Find full textLin, Simon C., and Eric Yen. Managed Grids and Cloud Systems in the Asia-Pacific Research Community. Springer, 2010.
Find full textBook chapters on the topic "Informatique nuage"
FALSAFI, Babak. "Architecture de serveur pour un centre de données post-Moore." In Systèmes multiprocesseurs sur puce 2, 159–72. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9022.ch6.
Full textReports on the topic "Informatique nuage"
Heller, Lorena, Rodrigo López, and Ricardo Nogales. Nudging Self-employed Women to Contribute to Social Security. Inter-American Development Bank, October 2024. http://dx.doi.org/10.18235/0013144.
Full text