Academic literature on the topic 'Internet des objets – Protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Internet des objets – Protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Internet des objets – Protection":

1

Haza, Marion. "Objets culturels dystopiques et adolescence." Topique 160, no. 1 (January 1, 2024): 97–110. http://dx.doi.org/10.3917/top.160.0097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Après avoir redéfini utopie et dystopie, cet article déploie l’analogie entre processus pubertaire et scénario dystopique. L’adolescent est bien une figure de héros de sa propre histoire, résistant au tourment pubertaire pour s’inscrire dans la société en tant que futur adulte, parfois dans un sacrifice psychopathologique. Les objets culturels adolescents servent de portage et de protection face à ce parcours dystopique : les fictions dystopiques des adolescents contemporains (livres, manga, jeux vidéo, etc.) figurent leurs conflictualités internes, rendent possible des indentifications ou contre-identifications, et leur permettent de les partager avec d’autres, que ce soient leurs pairs, mais aussi, les adultes comme les thérapeutes.
2

Meiller, Yannick. "La sécurité de l’information devrait être plus présente dans les programmes des écoles de management." Sécurité et stratégie 32, no. 4 (March 19, 2024): 12–16. http://dx.doi.org/10.3917/sestr.032.0012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Titulaire d’un doctorat en Informatique et Intelligence artificielle (systèmes industriels), obtenu à ISAE-Supaéro, Yannick Meiller est professeur à ESCP Europe . Ses travaux de recherche et ses enseignements portent pour l’essentiel sur le numérique et les domaines associés (traitements de l’information, Internet des objets, protection des données à caractère personnel, sécurité, systèmes d’information…), ainsi que sur le management de projets innovants . Il nous explique ici pourquoi la sécurité de l’information est un sujet à enseigner dans les écoles de management .
3

WANG, Haixiang, Jingyi CAO, and Zhe LIU. "Energy Internet and Its Trusted Protection Architecture." Wuhan University Journal of Natural Sciences 27, no. 2 (April 2022): 169–76. http://dx.doi.org/10.1051/wujns/2022272169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Through the combination of new energy and Internet technology, the Energy Internet deeply integrates various complex network systems such as power, transportation and natural gas, aiming to change the energy utilization model and promote the sustainable development of economy and society. The Energy Internet takes the power grid as the "Backbone Network" , integrating the autonomous units of distributed energy, and integrating information and energy through the open-peer information and energy integration architecture. Information interaction scenarios of the Energy Internet information interaction scenarios include "human-object" , "human-human" and "object-object" . In this new interconnection mechanism environment, the lack of any security defenses may leave the Energy Internet exposed to the risk of information leakage, theft and loss, resulting in immeasurable losses. From "human-object" , "object-object" and "human-human" interaction scenarios, the paper puts forward fine-grained access control mechanism, trusted computing environment building in IoT devices and trusted communication channel construction, and designs a trusted protection architecture for the Energy Internet to ensure the data security throughout its life cycle. We verify that the proposed architecture can provide trusted environment for the Energy Internet.
4

Samahalska, Y. "Personal data protection in the Internet." Uzhhorod National University Herald. Series: Law 2, no. 82 (June 10, 2024): 259–63. http://dx.doi.org/10.24144/2307-3322.2024.82.2.41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A personal daily communication is connected with giving and receiving a large amount of information. A common visit to a website can provide its owner with information about its users (cookies). A registration will provide the owner with a confidential information. In this view, it became necessary to protect a person and to regulate a separate subtype of such information called “personal data”. The concept of “personal data” is not new for Ukraine. The Law “On Protection of Personal Data” was adopted in 2010, however, the practice of its realization shows that the subjects of relations related to personal data interpret it quite superficially. Thus, the owners and managers of personal data formally, without specifying the purpose and method of processing, notify the subject of personal data that his personal data will be processed. And the subjects of personal data give such consent without reading the procedure for personal data processing or the privacy policy. The probability that the personal database will be deleted after the termination of the legal relationship by the owner or manager is quite small. Due to inappropriate protection and control personal database are constant objects of leaks and thefts, which turn to other crimes, especially on the Internet. The article pays special attention to the research about the collection of personal data on the websites of Ukrainian political parties, because such personal data are sensitive and their processing should be carried out especially carefully. The leakage of personal data supporters of a certain political force may pose a physical danger to them in martial law conditions. The author concludes it is necessary to bring the national legislation on protection of personal data to the requirements of the General Data Protection Regulation and to strengthen the control over its compliance by increasing responsibility for violations of the legislation on the protection of personal data.
5

Logvynenko, M. I., I. V. Karikh, and A. V. Dykovets. "Problems of protection of copyright objects in the network Internet." Legal Horizons 15, no. 28 (2019): 21–25. http://dx.doi.org/10.21272/legalhorizons.2019.i15.p21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Logvynenko, M. I., I. V. Karikh, and A. V. Dykovets. "Problems of protection of copyright objects in the network Internet." Legal Horizons 15, no. 28 (2019): 21–25. http://dx.doi.org/10.21272/legalhorizons.2019.i15.p:21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Moskalenko, I. A. "Registration of works as a tool to protect copyright in cross-border relations (Internet)." Actual Problems of Russian Law, no. 3 (May 4, 2019): 142–50. http://dx.doi.org/10.17803/1994-1471.2019.100.3.142-150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The paper analyzes copyright registration systems in the Russian Federation and abroad. The fact of creation of a work gives rise to the author a number of rights and obligations without performing any formalities, including registration of the work. There are three systems in which registration of a work creates for the copyright holder additional protection of the rights of the author, does not create negative consequences for non-compliance with the registration procedure or is provided by law only for specific copyright objects. Deposit is considered as an element of the procedure for registration of works, including as an indirect confirmation of the fact of the creation of a digital work for the lex loci originis collision binding states (the law of the state of origin of the work), and for the lex loci protectionis targeting states (the law of the state where protection is claimed), the deposit does not confirm the fact of the creation of the work, but helps to preserve the copyright object.
8

Kurniawan Sihombing, Agung, Rika Ratna Permata, and Tasya Safiranita Ramli. "Comparison of Digital Copyright Protection on Over the Top (OTT) Streaming Content Media in Indonesia and the United States." PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 8, no. 2 (2021): 183–212. http://dx.doi.org/10.22304/pjih.v8n2.a2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In the rapid technological development, physical boundaries have begun to disappear. The internet has created a ‘free culture’. In addition, the era is challenging the copyright concept along with the emergence of ‘digital copyright’. It has become the main commodity of Over-the-Top services providing means of communication and entertainment through the internet. Content streaming service like Netflix uses films, as well as other cinematographic works, as its main commodities. OTT Streaming media helps to protect copyright holders' rights that previously have been violated by illegal streaming sites on the internet. Unfortunately, it also raises a new question: how digital copyright-objects can be protected in this kind of service. Without physical form, copyright object can be distributed easily on the internet, and it may lead to right violations. To answer this problem, the authors aim to describe the digital copyright protection on OTT Streaming Content Media in Indonesia and compare them to the 1998 Digital Millennium Copyright Act (DMCA) of the United States of America using a descriptive-analytical approach. This study employed a normative juridical approach with secondary data. The results of this study indicate that digital copyright protection in Indonesia is still centered on conventional copyright objects, and a sui generis law is needed to provide better protection for digital copyright objects.
9

Idrisov, Hussein V. "Certain issues of legal regulation of the placement of intellectual property objects on the Internet: problematic aspects and search for solutions." Current Issues of the State and Law, no. 4 (2022): 556–66. http://dx.doi.org/10.20310/2587-9340-2022-6-4-556-566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
We provide a legal description of the problems that arise as a result of the placement of intellectual property objects on the Internet, mediated violations of the rights of legitimate copyright holders. The purpose of the study: to conduct a legal analysis (legal characteristics and analysis of judicial practice) of problematic issues of regulating the placement of intellectual property objects on the Internet. We point out that the legal protection of intellectual property subjects is possible through the implementation of criminal law and civil law measures adapted to the existing objective realities in cyberspace. We carry out a characterization of the subject composition of copyright holders and subjects of responsibility, cases from judicial practice are given. In addition, we consider pre-trial ways to resolve disputes between authors of works and owners of Internet resources. The study is based on formal legal and comparative legal methods, which have found their application in the legal analysis of the problems of protecting audiovisual works on the Internet. As a conclusion, we express the need for more effective, efficient protection of this institution of law at the present stage of its development by optimizing the criminal law and civil law means of protecting the institution of intellectual property law and the legitimate interests of copyright holders.
10

Et. al., Harish Kumar N,. "Mutual authentication and data security in IOT using hybrid mac id and elliptical curve cryptography." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 11 (May 10, 2021): 501–7. http://dx.doi.org/10.17762/turcomat.v12i11.5913.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Internet of Things (IoT) is a new emergent technology of the Internet. The Internet that we use today runs with human interposing. The Internet of Things which is the extended version of the internet which aims to offer the machine to machine communication or the device may be referred to as objects we call it object to object communication, which is without the involvement of the humans. With the growth of IOT in the market there are many considerable subjects relating to privacy, authentication, data confidentiality, data protection and other problems where solutions to these issues to be derived. This paper works on providing Mutual authentication and data security. A light weight Approach has been employed by generating Hybrid MAC ID for mutual authentication and using Elliptical Curve for secure data transfer which provides authentication and data confidentiality in the IoT Network.

Dissertations / Theses on the topic "Internet des objets – Protection":

1

Nicomette, Vincent. "La protection dans les systèmes à objets répartis." Phd thesis, Institut National Polytechnique de Toulouse - INPT, 1996. http://tel.archives-ouvertes.fr/tel-00175252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
La protection des systèmes répartis est un problème complexe : en quelles entités du système peut-on avoir confiance et étant donné cette confiance, comment assurer la protection du système global. L'approche adoptée dans cette thèse consiste à combiner d'une part une gestion globale et centralisée des droits d'accès aux objets persistants du système par un serveur d'autorisation et d'autre part une protection locale par un noyau de sécurité sur chaque site du système réparti. Ce noyau contrôle les accès à tous les objets locaux (persistants ou temporaires) et a de plus la responsabilité de la gestion des droits d'accès aux objets temporaires locaux. Un schéma d'autorisation est développé pour une telle architecture. Ce schéma est élaboré dans le cadre de systèmes composés d'objets répartis (au sens de la programmation orientée-objets). Il permet de respecter au mieux le principe du moindre privilège, définit de nouveaux droits facilement administrables (appelés droits symboliques), et un nouveau schéma de délégation de droits. Ce modèle est utilisé dans le cadre d'une politique de sécurité discrétionnaire et dans le cadre d'une politique de sécurité multiniveau. Pour cela, un modèle de sécurité multiniveau adapté au modèle objet est développé et présenté dans cette thèse. Un exemple d'implémentation de ce schéma d'autorisation est enfin détaillé.
2

Morel, Victor. "Enhancing transparency and consent in the internet of things." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Le nombre d’appareils connectés à Internet ne cesse d’augmenter, certaines perspectives prédisant 75 milliards d’appareils d’ici 2025. L’Internet des Objets envisagé il y a 20 ans se matérialise à une vitesse soutenue, mais cette croissance n’est pas sans conséquence. Le nombre croissant d’appareils suscite en effet des possibilités de surveillance jamais vu auparavant. Un cap a été franchi en 2018 pour la protection de l’intimité numérique (privacy), avec la mise en application du Règlement Européen sur la Protection des Données (RGPD) dans l’Union Européenne. Il impose des obligations aux responsables de traitements sur le contenu de l’information à communiquer aux personnes concernées à propos de la collecte et du traitement de leurs données personnelles, ainsi que sur les moyens de communiquer cette information. Cette information est d’autant plus importante qu’elle est une condition préalable à la validité du consentement. Cependant, l’Internet des Objets peut poser des difficultés pour mettre en place la communication de l’information nécessaire à la validité légale d’un traitement, ainsi qu’à la gestion du consentement. La tension entre les exigences du RGPD à propos de l’information et du consentement et l’Internet des Objets n’est pas chose facile à résoudre. Ce n’est cependant pas impossible. Le but de cette thèse est de fournir une solution pour la communication de l’information et la gestion du consentement dans l’Internet des Objets. Pour ce faire, nous proposons un cadre conceptuel générique pour la communication de l’information et la gestion du consentement dans l’Internet des Objets. Ce cadre conceptuel est composé d’un protocole de communication et de négociation des politiques de protection de la vie privée (privacy policies), d’exigences pour la présentation de l’information et l’interaction avec les personnes concernées, ainsi que d’exigences pour la démonstration du consentement. Nous soutenons la faisabilité de ce cadre conceptuel générique avec différentes options de mise en oeuvre. La communication de l’information et du consentement peut être effectuée de deux manières : directement et indirectement. Nous proposons ensuite différentes manières de mettre en oeuvre la présentation de l’information et la démonstration du consentement. Un espace de conception (design space) est aussi proposé à destination des concepteurs de systèmes, afin d’aider à choisir entre différentes options de mise en oeuvre. Enfin, nous proposons des prototypes fonctionnels, conçus pour démontrer la faisabilité des options de mise en oeuvre du cadre conceptuel. Nous illustrons comment la communication indirecte de l’information peut être mise en oeuvre au sein d’un site web collaboratif appelé Map of Things. Nous présentons ensuite la communication directe de l’information et du consentement combinée à un agent présentant l’information aux personnes concernées à travers une application mobile nommée CoIoT
In an increasingly connected world, the Internet permeates every aspect of our lives. The number of devices connected to the global network is rising, with prospects foreseeing 75 billions devices by 2025. The Internet of Things envisioned twenty years ago is now materializing at a fast pace, but this growth is not without consequence. The increasing number of devices raises the possibility of surveillance to a level never seen before. A major step has been taken in 2018 to safeguard privacy, with the introduction of the General Data Protection Regulation (GDPR) in the European Union. It imposes obligations to data controllers on the content of information about personal data collection and processing, and on the means of communication of this information to data subjects. This information is all the more important that it is required for consent, which is one of the legal grounds to process personal data. However, the Internet of Things can pose difficulties to implement lawful information communication and consent management. The tension between the requirements of the GDPR for information and consent and the Internet of Things cannot be easily solved. It is however possible. The goal of this thesis is to provide a solution for information communication and consent management in the Internet of Things from a technological point of view. To do so, we introduce a generic framework for information communication and consent management in the Internet of Things. This framework is composed of a protocol to communicate and negotiate privacy policies, requirements to present information and interact with data subjects, and requirements over the provability of consent. We support the feasibility of this generic framework with different options of implementation. The communication of information and consent through privacy policies can be implemented in two different manners: directly and indirectly. We then propose ways to implement the presentation of information and the provability of consent. A design space is also provided for systems designers, as a guide for choosing between the direct and the indirect implementations. Finally, we present fully functioning prototypes devised to demonstrate the feasibility of the framework’s implementations. We illustrate how the indirect implementation of the framework can be developed as a collaborative website named Map of Things. We then sketch the direct implementation combined with the agent presenting information to data subjects under the mobile application CoIoT
3

Ould, yahia Youcef. "Proposition d’un modèle de sécurité pour la protection de données personnelles dans les systèmes basés sur l’internet des objets." Electronic Thesis or Diss., Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Les technologies de l'Internet des objets (IdO) et de l'externalisation des services informatiques ont conduit à l'émergence de nouvelles menace sur la vie privée des utilisateurs. Cependant, l'implémentation des moyens de sécurité traditionnels sur les équipements de l'IdO constitue un premier défi lié aux limites de capacités. D'un autre côté, la délégation du traitement et du stockage des données, nous pose le problème de confiance envers les fournisseurs de service.Dans ce contexte, nous avons proposé une solution de chiffrement qui assure une protection de données centrée sur leurs propriétaires et adaptée à l'environnement contraignant des objets connectés. Ce modèle se base sur le chiffrement par attributs avec externalisation sécurisée et la technologie de la Blockchain. Ensuite, en réponse à la problématique de la confiance et de la sélection du service, nous avons exploré les possibilités offertes par les outils de l'intelligence artificielle. Pour ce faire, nous avons proposé un modèle de filtrage collaboratif basé sur les cartes de Kohonen avec une solution pour détecter les utilisateurs non fiable
Internet of Things (IoT) and IT service outsourcing technologies have led to the emergence of new threats to users' privacy. However, the implementation of traditional security measures on IoT equipment is a first challenge due to capacity limitations. On the other hand, the offloading of data processing and storage poses the problem of trust in service providers.In this context, we have proposed an encryption solution that provides owner-centric data protection adapted to the constraining environment of IoT. This model is based on attribute-based encryption with secure offloading capability and Blockchain technology. Then, in response to the issue of trust and service selection, we explored the possibilities offered by artificial intelligence tools. To do this, we proposed a collaborative filtering model based on Kohonen maps and efficient solution to detect the untrusted users
4

Ould, yahia Youcef. "Proposition d’un modèle de sécurité pour la protection de données personnelles dans les systèmes basés sur l’internet des objets." Thesis, Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1242/document.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Les technologies de l'Internet des objets (IdO) et de l'externalisation des services informatiques ont conduit à l'émergence de nouvelles menace sur la vie privée des utilisateurs. Cependant, l'implémentation des moyens de sécurité traditionnels sur les équipements de l'IdO constitue un premier défi lié aux limites de capacités. D'un autre côté, la délégation du traitement et du stockage des données, nous pose le problème de confiance envers les fournisseurs de service.Dans ce contexte, nous avons proposé une solution de chiffrement qui assure une protection de données centrée sur leurs propriétaires et adaptée à l'environnement contraignant des objets connectés. Ce modèle se base sur le chiffrement par attributs avec externalisation sécurisée et la technologie de la Blockchain. Ensuite, en réponse à la problématique de la confiance et de la sélection du service, nous avons exploré les possibilités offertes par les outils de l'intelligence artificielle. Pour ce faire, nous avons proposé un modèle de filtrage collaboratif basé sur les cartes de Kohonen avec une solution pour détecter les utilisateurs non fiable
Internet of Things (IoT) and IT service outsourcing technologies have led to the emergence of new threats to users' privacy. However, the implementation of traditional security measures on IoT equipment is a first challenge due to capacity limitations. On the other hand, the offloading of data processing and storage poses the problem of trust in service providers.In this context, we have proposed an encryption solution that provides owner-centric data protection adapted to the constraining environment of IoT. This model is based on attribute-based encryption with secure offloading capability and Blockchain technology. Then, in response to the issue of trust and service selection, we explored the possibilities offered by artificial intelligence tools. To do this, we proposed a collaborative filtering model based on Kohonen maps and efficient solution to detect the untrusted users
5

Celosia, Guillaume. "Privacy challenges in wireless communications of the Internet of Things." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Également connue sous le nom d'Internet des Objets (IdO), la prolifération des objets connectés offre des opportunités sans précédent aux consommateurs. Des moniteurs d'activité physique aux assistants médicaux, en passant par les appareils électroménagers pour maisons intelligentes, les objets IdO évoluent dans une pléthore de domaines d'application. Cependant, les avantages qu'ils peuvent apporter à notre société augmentent conjointement avec leurs implications en matière de vie privée. Communiquant continuellement de précieuses informations par le biais de liaisons non filaires telles que le Bluetooth et le Wi-Fi, ces appareils connectés accompagnent leurs propriétaires dans leurs activités. La plupart du temps émises sur des canaux ouverts, et parfois en l'absence de chiffrement, ces informations sont alors facilement accessibles pour tout attaquant passif à portée. Dans cette thèse, nous explorons deux problèmes de vie privée majeurs résultant de l'expansion de l'IdO et de ses communications sans fil : le traçage physique et l'inférence d'informations utilisateurs. Sur la base de deux grands ensembles de données composés de signaux radio issus de périphériques Bluetooth/BLE, nous mettons d'abord en échec les fonctionnalités anti-traçage existantes avant de détailler plusieurs applications invasives pour la vie privée. En s'appuyant sur des attaques passives et actives, nous démontrons également que les messages diffusés contiennent des informations en clair allant des caractéristiques techniques des appareils aux données personnelles des utilisateurs telles que des adresses e-mail et numéros de téléphone. Dans un second temps, nous concevons des contre-mesures pratiques pour résoudre les problèmes de vie privée identifiés. Dans ce sens, nous fournissons des recommandations aux fabricants, et proposons une approche afin de vérifier l'absence de failles dans l'implémentation de leurs protocoles. Enfin, dans le but d'illustrer davantage les menaces de vie privée enquêtées, nous implémentons deux démonstrateurs. Par conséquent, Venom introduit un système de traçage physique visuel et expérimental, tandis qu'Himiko propose une interface humaine permettant d'inférer des informations sur les appareils IdO et leurs propriétaires
Also known as the Internet of Things (IoT), the proliferation of connected objects offers unprecedented opportunities to consumers. From fitness trackers to medical assistants, through smarthome appliances, the IoT objects are evolving in a plethora of application fields. However, the benefits that they can bring to our society increase along with their privacy implications. Continuously communicating valuable information via wireless links such as Bluetooth and Wi-Fi, those connected devices support their owners within their activities. Most of the time emitted on open channels, and sometimes in the absence of encryption, those information are then easily accessible to any passive attacker in range. In this thesis, we explore two major privacy concerns resulting from the expansion of the IoT and its wireless communications: physical tracking and inference of users information. Based on two large datasets composed of radio signals from Bluetooth/BLE devices, we first defeat existing anti-tracking features prior to detail several privacy invasive applications. Relying on passive and active attacks, we also demonstrate that broadcasted messages contain cleartext information ranging from the devices technical characteristics to personal data of the users such as e-mail addresses and phone numbers. In a second time, we design practical countermeasures to address the identified privacy issues. In this direction, we provide recommendations to manufacturers, and propose an approach to verify the absence of flaws in the implementation of their protocols. Finally, to further illustrate the investigated privacy threats, we implement two demonstrators. As a result, Venom introduces a visual and experimental physical tracking system, while Himiko proposes a human interface allowing to infer information on IoT devices and their owners
6

Lanna, Maximilien. "La protection des données à caractère personnel à l’épreuve de l’automesure connectée." Thesis, Paris 2, 2019. http://www.theses.fr/2019PA020026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Le droit des données à caractère personnel est aujourd’hui un droit en pleine mutation. La protection qu’il est censé conférer aux individus est confrontée à l’apparition de nouvelles pratiques reposant sur l’utilisation de dispositifs permettant une collecte à grande échelle de données à caractère personnel. S’inscrivant dans ce cadre, la pratique de l’automesure connectée ou quantified-self a contribué, par ses modalités de fonctionnement, à une remise en cause des principes protecteurs instaurés depuis la fin des années 1970 par la loi Informatique et Libertés.Cette étude poursuit un double objectif. Tout d’abord, faciliter l’identification des situations dans lesquelles la pratique de l’automesure connectée met à mal certains principes fondamentaux de la protection des données, de façon à pouvoir mettre en lumière les risques auxquels les individus sont soumis. Ensuite, identifier les mutations du cadre juridique lorsque celui-ci est confronté au développement des technologies employées pour la pratique de l’automesure : ces technologies conduisent à une technicité croissante du droit et favorisent, conformément aux mécanismes instaurés par le RGPD, le développement d’une régulation co-construite par les différents acteurs du secteur
Personal data protection law is today at a turning point : its core principles are weakened by self-tracking technologies, thus reducing protection of individuals. In order to determine how new technologies affect the law, this study aims to figure ou the paradigm shift that has been implemented by the new RGPD and its consequences on personal data protection
7

Junges, Pierre-Marie. "Évaluation à l'échelle de l'Internet du niveau d'exposition des objets connectés face aux risques de sécurité." Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
L'usage des objets de l'Internet des Objets (IdO) dans nos environnements personnel ou professionnel facilite nos interactions du quotidien, mais ces derniers souffrent souvent de problèmes de sécurité. L'enjeu de cette thèse est d'évaluer la sécurité des objets IdO à l'échelle de l'Internet selon plusieurs axes. Pour ce faire, les travaux proposés doivent satisfaire plusieurs contraintes comme le passage à l'échelle, la gestion de l'hétérogénéité des objets IdO ou, dans le cas d'une analyse de trafic réseau, l'impossibilité d'intercepter les communications sans-fil d'objets IdO. Nous nous sommes d'abord intéressés aux risques de fuite de données utilisateur introduits par les box domotiques, dont le rôle est d'agir comme un relai entre un utilisateur et des objets IdO. De plus, la box agrège le trafic réseau des objets ce qui empêche l'utilisation des méthodes existantes pour identifier les actions utilisateur effectuées. Nous proposons une méthode capable d'inférer les actions utilisateur en décomposant la taille des données dans les requêtes reçues par la box en une ou plusieurs combinaisons d'actions utilisateur possibles. Notre méthode a ensuite été appliquée sur une box domotique connectée à 16 objets IdO, et nous avons montré qu'un attaquant pouvait inférer les actions utilisateur dans plus de 91.2% des cas. Dans une deuxième contribution, nous évaluons le niveau de sécurité d'objets IdO à l'aide d'une analyse hybride de firmwares combinant une analyse statique et dynamique. Contrairement aux solutions existantes, notre objectif n'est pas de détecter de nouvelles vulnérabilités mais plutôt d'analyser la composition des binaires présents dans les firmwares, notamment par rapport à la présence de vulnérabilités connues ou à l'utilisation de versions de binaires obsolètes. Nous avons ensuite analysé 4 730 firmwares d'objets IdO publiés entre 2009 et 2019, et noté une utilisation prépondérante de certains binaires, mais également une vague de patches en 2017. L'analyse de firmwares permet d'obtenir 1) des informations précises sur les binaires (nom et version), 2) les noms et mots de passe des utilisateurs. À l'aide de ces informations, nous avons élaboré une méthode d'identification active permettant à un attaquant d'inférer, à partir des résultats supposés d'un scan de ports, des propriétés précises sur un objet IdO connecté, comme le nom du binaire utilisé pour déployer le serveur HTTP ou les noms d'utilisateur. Notre méthode consiste à entraîner des classificateurs à partir des données extraites des firmwares. Elle est capable de prédire correctement (>73.14%) le nom ou la version d'un binaire déployant HTTP, SSH ou DNS. La prédiction des mots de passe nécessite, elle, moins de deux tentatives. L'utilisation de notre approche semble plus efficace, et furtive, qu'une approche par brute-force. Notre quatrième contribution s'intéresse aux cyberattaques ciblant les objets IdO. Pour ce faire, nous avons défini un pot de miel à forte interaction basé sur une méthode d'émulation utilisant des firmwares d'objets IdO. Le déploiement d'un pot de miel est difficile à cause de la contrainte de furtivité que les méthodes existantes d'émulation d'objets IdO n'intègrent pas. Notre contribution est capable d'émuler un objet IdO en 1) maximisant sa furtivité, et 2) en intégrant des fonctionnalités inhérentes à un pot de miel (par exemple exfiltrer les activités des attaquants). Notre approche peut émuler jusqu'à 825 (82.5%) objets IdO contre 454 (45.4%) avec la méthode de l'état de l'art. Enfin, nous avons déployé notre pot de miel durant environ un an, et montré que ce dernier recevait des attaques inconnues ou récentes de botnets, et d'humains
Nowadays, the use of Internet of Things (IoT) devices in our personal and work space makes our everyday life easier, but those IoT devices often suffer from security issues. The objective of this thesis is to evaluate the security of IoT devices. On one hand, we investigate the risk of user privacy leakage introduced by IoT hubs (or IoT gateways). Those IoT hubs act as a middlebox between a user and the IoT devices. Existing passive fingerprinting techniques are not applicable in this configuration considering that the network traffic of each individual IoT device attached to the IoT hub is not accessible. We propose a passive fingerprinting technique to infer the user actions by analysing the network traffic of the IoT gateway. Our method works on encrypted network traffic, and consists of decomposing a packet payload size into a set of, potential, user actions. We applied our technique on one IoT gateway controlling up to 16 IoT devices and show that an attacker, located on the Internet, is able to infer the user actions in more than 91.2% of the investigated cases.In a further step, we propose a hybrid firmware analysis technique to evaluate the security of an IoT device by inspecting the content of its firmware. Our analysis combines a dynamic analysis and a static analysis to improve our chances to extract data. Our objectives are not to detect unknown vulnerabilities but only the known ones, and inspect if the binaries included are deprecated. We applied our analysis on 4,730 firmwares belonging to IoT devices released between 2009 and 2019, and noticed the widespread use of a small set of binaries, notably to deploy HTTP and SSH services. From 2017, we observed that IoT manufacturers implemented many updates which reduced the exposure to known vulnerabilities.Using those firmwares, we defined an active fingerprinting technique allowing an attacker to infer details about a connected IoT devices, such as its brand or the binary used to deploy the HTTP server. Thanks to the firmware content, we can 1) obtain precise information about the binaries (name, version), and 2) assume the services actually deployed by the device i.e., the results of a TCP/UDP port scans. Considering those two aspects, our method consists of training classifiers to predict one particular property of a connected IoT device from, among others, the supposed results of a TCP/UDP port scans. Our method allows to predict fine details such as the name or version of a binary, the usernames or the passwords present in an IoT device. Using our approach, we noticed that the predictions of the name and version of the HTTP, SSH and DNS binaries are achieved with a precision superior to 73.14%. On the other hand, the prediction of at least one valid password is more challenging and requires up to two tries. Our method is more effective and furtive than a naive brute-force method.Knowing the vulnerabilies present in a IoT device does not guarantee that attackers use them on a regular basis. Hence, we propose in our fourth contribution, a high interaction honeypot capable of intercepting cyberattacks targeting IoT devices. The defined honeypot is based on an existing emulation technique that uses IoT devices firmwares. Implementing an honeypot is hard, and because of the stealth constraint, the existing emulation technique could not be used as-is. Due to this constraint, we implemented a framework capable of emulating IoT devices while assuring their furtivity, and adding honeypot-specific capabilities, such as exfiltrating the attackers activities. We then compared our approach to the state of the art one, and showed that ours can emulate up to 825 (82.5%) devices compared to 454 (45.4%). Our honeypot was deployed on one server during about one year and captured unknown and recent attacks from botnets, and sometimes humans
8

Moreira, da Costa Thiago. "OPP_IoT An ontology-based privacy preservation approach for the Internet of Things." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM003/document.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
La vulgarisation de l'informatique omniprésente à travers l'internet des objets (IdO) représente un défi pour la préservation de la vie privée et la confidentialité des individus.Les menaces contre la confidentialité sont directement liées à la capacité de détection de capteur dans l'IdO en suivant les individus dans presque toutes les situations de leur vie.Alliée à cela, les techniques d'exploration de données ont évolué et ont été utilisées pour extraire une multitude d’informations personnelles à partir de données du flux des données des capteurs.Ce modèle de confiance repose sur la fiabilité du consommateur de données pour extraire uniquement des informations accordées.Cependant, ce modèle permet l’exposition d’informations personnelles à des adversaires de la vie privée.Afin de fournir un mécanisme pour préserver la confidentialité dans l'IdO, nous proposons un modèle de capteur virtuel qui renforce une politique de confidentialité dans le flux des données des capteurs.Ce mécanisme intermédiaire se met en place entre les capteurs physiques et les consommateurs de données.En conséquence, nous sommes en mesure d'optimiser l'utilisation des techniques de preservation de confidentialité, telles qu'anonymisation, en les appliquant de manière sélective selon les intentions d'inférence des capteurs virtuelles, tout en empêchant les capteurs virtuels malveillants d'exécuter ou d'obtenir un accès direct aux données brutes des capteurs physiques.En outre, nous proposons une ontologie pour classer les informations personnelles basées sur la science du comportement (Behavior Computing), ce qui facilite la définition de la politique de confidentialité et à la classification de l'information en fonction des contextes comportementaux
The spread of pervasive computing through the Internet of Things (IoT) represents a challenge for privacy preservation.Privacy threats are directly related to the capacity of the IoT sensing to track individuals in almost every situation of their lives.Allied to that, data mining techniques have evolved and has been used to extract a myriad of personal information from sensor data stream.This trust model relies on the trustworthiness of the data consumer who should infer only intended information.However, this model exposes personal information to privacy adversary.In order to provide a privacy preservation for the IoT, we propose a privacy-aware virtual sensor model that enforces privacy policy in the IoT sensing as a service.This mechanism intermediates physical sensors and data consumers.As a consequence, we are able to optimize the use of privacy preserving techniques by applying them selectively according to virtual sensor inference intentions, while preventing malicious virtual sensors to execute or get direct access to raw sensor data.In addition, we propose an ontology to classify personal information based on the Behavior Computing, facilitating privacy policy definition and information classification based on the behavioral contexts
9

Diop, Aïda Abdou. "Cryptographic mechanisms for device authentication and attestation in the internet of things." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
En introduisant de nouvelles exigences de communications décentralisées entre les systèmes d’informations, l’Internet des Objets (IdO) et le Machine-to-Machine (M2M) ont révolutionné l’architecture de sécurité classique des dits systèmes. Dans cette nouvelle configuration, la sécurité et la protection des données à caractère personnel échangées puis stockées par ces systèmes est devenu un enjeu primordial pour le déploiement de ces nouveaux écosystèmes. Ces objets présentent aussi des contraintes physiques fortes impactant leurs fonctionnalités, notamment en termes de capacité de calcul et de mémoire, d’énergie, et d’exigences de sécurité en fonction du cas d’usage et de l’application concernés. Ces nouveaux modèles de communications requièrent une nouvelle manière de penser la sécurité des systèmes, qui est notamment dû au déploiement physiques des objets dans le monde réel, et à grande échelle. Cet accès physique permet notamment à un attaquant d’observer un objet, et d’en perturber le fonctionnement. Nous nous intéresserons dans cette thèse aux problématiques liées à l’intégrité des communications entre les objets et les systèmes embarqués pour différents cas d’usages dans l’Internet des Objets, ainsi qu’à l’intégrité des micro-logiciels des dits systèmes. En d’autres termes, nous nous intéressons aux mécanismes d’authentification et d’attestation adaptés pour des environnements contraints.Il existe des problématiques de sécurité concrètes concernant l’intégrité des communications entres les objets. D’une part, la question de l’intégrité des communications relève des mécanismes d’authentification des communications. Ces dernières sont basées sur des algorithmes de cryptographie à clé publique, et permettent à chaque nœud d’un réseau de communication de s’assurer de l’identité de chaque nœud sur le réseau, et ainsi d’authentifier les messages échangés.D’un autre côté, la question de l’intégrité des objets eux mêmes, et notamment de leur micro-logicielle, fait appelle à des mécanismes d’authentification à distance appelés "Attestation à distance". L’authentification et l’attestation des objets dans l’Internet des Objets requiert une identification forte et mutuelle entre les objets, ainsi qu’avec les stations de bases. Cette contrainte offre un avantage certains aux attaquants, qui peuvent exploiter cette information pour lancer des attaques ciblées compromettant ainsi la sûreté de ces systèmes, ou pour extraire des données à caractère personnel sur les utilisateurs finaux dans certains cas d’usages.Cette thèse se focalise sur le développement de mécanismes d’authentification et d’attestation anonymes et efficaces pour certains cas d'usages de l'Internet des objets. Nous introduisons dans une première partie une nouvelle primitive d'attestation anonyme (pre-DAA) efficace, et prouvée sûre dans le modèle de l'oracle aléatoire sous une variante de l'hypothèse q-SDH. Nous développons ensuite deux protocoles d’authentification pour différents cas d'usages, en se basant notamment sur notre primitive de pre-DAA. Le premier protocole permet l'authentification efficace, sûre, et anonyme des communications dans les réseaux ad hoc de véhicules connectés. Le deuxième protocole permet l’authentification anonyme des usagers sur les réseaux de transport publiques par le biais de pass de transports mobiles anonymes.La deuxième partie de cette thèse se concentre ensuite sur le développement d’un mécanisme d’attestation d’essaims d’objets, avec une propriété de détection lorsque l’un des objets fournit une fausse attestation
The new decentralized computing paradigm introduced by Machine-to-Machine (M2M) communications and the Internet of Things (IoT) ecosystem requires developing new security mechanisms and frameworks, adapted to this new architecture. The variety of IoT use cases includes applications leveraging low-level devices such as sensor or actuators, to applications deploying safety critical devices such as connected vehicles in Intelligent Transportation Systems (ITS). Devices are deployed as nodes in communication networks, and have become in recent years targets for attackers who exploit the resource-constrained nature of the devices in order to compromise the safety, security, and availability of the different applications. Two of the main challenges in this ecosystem are securing the communication between IoT devices, and ensuring that devices in the network have not been compromised or tampered with, thus attesting of the integrity of the entire network. The challenges are exacerbated by the nature of devices, which present stringent constraints, notably in terms of computational capabilities, storage space, and energy resource. In addition, new privacy concerns affecting users in IoT applications have risen, and require implementing privacy-friendly authentication and attestation mechanisms.Authentication mechanisms allow systems to identify themselves on the network, and provide solutions for the first challenge. Remote Attestation is a security mechanism which enables control systems to verify the software state of devices in the network, thus detecting any tampering or remote malware injection attacks.In this thesis, we aim to contribute to the development of new and privacy-preserving authentication and attestation mechanisms, which are particularly adapted for implementation in constrained environments.In the first part of this thesis, we leverage a cryptographic mechanism deployed in trusted computing, namely Direct Anonymous Attestation (DAA), in order to provide decentralized, and privacy-preserving authentication protocols adapted for constrained environments. Our work contributes to the development of a variant of Direct Anonymous Attestation schemes, called pre-Direct Anonymous Attestation (pre-DAA), which achieves a trade-off between security andefficiency that was not previously achieved in the literature. In particular, our pre-DAA scheme is proven secure in the Random Oracle Model (ROM) under the q-Strong Diffie Hellman (q—SDH) assumption, while performing better than DAA schemes proven secure under an interactive assumption. The pre-DAA scheme is subsequently used in the development of two privacy-preserving authentication protocols. The first application of our pre-DAA scheme consists in the design of a decentralized architecture for secure communication in vehicular ad hoc networks, which removes the need for a centralize Public Key Infrastructure. The second application of our pre-DAA scheme is the design of a mobile-based access control protocol for public transport systems, which addresses the issue of user traceability inherent to current access control control protocols for transport systems.In the second part of this thesis, we address the device integrity verification challenge by designing a remote attestation protocol which enables the secure and efficient attestation of groups (or swarms) of devices. Our attestation protocol verifies the integrity of every device in the network during a single attestation phase, by leveraging the aggregating properties of an aggregate algebraic MAC scheme. Compared to swarm attestation protocols in the literature, our contribution enables the detection of an erroneous attestation report in the aggregated result, thus allowing the identification of compromised devices
10

Kouicem, Djamel Eddine. "Sécurité de l’Internet des objets pour les systèmes de systèmes." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
L'internet des objets (IoT) est une nouvelle technologie qui vise à connecter des milliards d'objets physiques à Internet. Ces objets peuvent être engagés dans des relations complexes, notamment la composition et la collaboration avec d'autres systèmes indépendants et hétérogènes, afin de fournir de nouvelles fonctionnalités, conduisant ainsi à ce que l'on appelle les systèmes de systèmes (SoS). Les composants de l'IoT communiquent et collaborent dans des environnements distribués et dynamiques, confrontés à plusieurs problèmes de sécurité de grande ampleur. La sécurité es tconsidérée parmi les enjeux majeurs de l'IoT et soulève des défis liés aux contraintes de capacité de calcul et stockage ainsi que le très grand nombre des objets connectés. Dans cette thèse, nous nous intéressons à l'application des outils cryptographiques ainsi que la technologie blockchain pour résoudre les problèmes de sécurité dans l'IoT, à savoir : l'authentification et la gestion de confiance. Dans un premier lieu, nous nous sommes intéressés au problème du contrôle d'accès distant des actionneurs intelligents utilisant des dispositifs IoT. Pour aborder ce problème, nous avons proposé une solution de contrôle d'accès efficace et à granularité fine, basée sur le mécanisme ABE (Attribute Based Encryption) et des chaînes de hachage. À l'aide d'outils formels d'analyse de sécurité, nous avons démontré la sécurité de notre protocole face aux attaques malveillantes. Dans un deuxième lieu, nous avons abordé le problème d'authentification dans les applications IoT basé sur le paradigme du fog computing. Nous avons proposé un nouveau protocole d'authentification mutuelle efficace qui est basé sur la technologie blockchain et la cryptographie à seuil. Dans notre solution, les objets IoT et les serveurs de fog n'ont besoin que de quelques informations à stocker pour vérifier l'authenticité de chaque objet du système. L’authentification est effectuée seulement sur la bordure du réseau sans passer par des entités externes. Ainsi, la latence et la capacité de stockage sont réduites au minimum. Enfin, dans notre troisième contribution, nous avons proposé un nouveau protocole de gestion de réputation basé sur la technologie blockchain et le fog computing, avec la prise en charge de la mobilité des objets connectés. Notre protocole permet aux objets IoT d'évaluer et de partager avec précision la réputation relative aux autres objets de manière scalable, sans se recourir à une entité de confiance. Nous avons confirmé l'efficacité de notre protocole par des analyses théoriques et des simulations approfondies. Nous avons montré que notre protocole surpasse les solutions existantes,notamment en matière de scalabilité, prise en charge de la mobilité, la communication et le calcul
The Internet of things (IoT) is a new technology that aims to connect billions of physical devices to the Internet. The components of IoT communicate and collaborate between each other in distributed and dynamic environments, which are facing several security challenges. In addition, the huge number of connected objects and the limitation of their resources make the security in IoT very difficult to achieve. In this thesis, we focus on the application of lightweight cryptographic approaches and blockchain technology to address security problems in IoT, namely : authentication and trust management. First, we were interested on some kind of IoT applications where we need to control remotely the execution of smart actuators using IoT devices. To solve this problem, we proposed an efficient and fine-grained access controlsolution, based on the Attribute Based Encryption (ABE) mechanism and oneway hash chains. Using formal security tools, we demonstrated the security of our scheme against malicious attacks. Second, we tackled the problem of authentication in IoT based fog computing environments. Existing authentication techniques do not consider latency constraints introduced in the context of fog computing architecture. In addition, some of them do not provide mutual authentication between devices and fog servers. To overcome these challenges, we proposed a novel, efficient and lightweight mutual authentication scheme based on blockchain technologyand secret sharing technique. We demonstrated the efficiency of our authentication scheme through extensive simulations. The third problem treated in this work is the trust management in IoT. Existing trust management protocols do not meet the new requirements introduced in IoT such as heterogeneity, mobility and scalability. To address these challenges, we proposed a new scalable trust management protocol based on consortium blockchain technology and fog computing paradigm, with mobility support. Our solution allows IoT devices to accurately assess and share trust recommendations about other devices in a scalable way without referring to any pre-trusted entity. We confirmed the efficiency of our proposal through theoretical analysis and extensive simulations. Finally, we showed that our protocol outperforms existing solutions especially in terms of scalability, mobility support, communication and computation

Books on the topic "Internet des objets – Protection":

1

Piette-Coudol, Thierry. Les objets connectés: Sécurité juridique et technique. Paris: Lexis Nexis, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maksurov, Aleksey. The use of special knowledge in proving cases of crimes and offenses on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1915941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The monograph examines the use of modern evidentiary capabilities in the legal process, which are available in connection with human activity in the global information space, including new electronic types of evidence. Such evidence is acquired through the application of special knowledge. The legal bases of the application of special knowledge by the bodies carrying out preliminary investigation, as well as the directions of the application of special knowledge in criminal proceedings are disclosed. Special attention is paid to the peculiarities of proving involvement in crimes (offenses) committed on the Internet. The concept and criminalistic significance of the method of committing crimes using information and telecommunication networks are defined, the objective elements of the method of committing such crimes (place, time, devices, objects of encroachment) are disclosed. Practical aspects of proving in cases of crimes committed using information and telecommunication networks, including the mechanism of trace formation in information networks, etc., are described. For researchers, lawyers, judges, prosecutors, investigators, employees of security companies and special services involved in the processing of information, its storage and protection.
3

Poulot, Dominique. L'art d'aimer les objets. Québec, Québec]: Presses de l'Université Laval, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Moura Vicente, Dário, and Sofia de Vasconcelos Casimiro, eds. Data Protection in the Internet. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-28049-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Savoy, Bénédicte. Objets du désir, désir d'objets. [Paris]: Collège de France, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dreyfus, Nathalie. Marques et Internet: Protection, valorisation, défense. Rueil-Malmaison: Lamy, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Galiardo, Antonio Cayón. Internet y derecho. Zaragoza: Gobierno de Aragon, Departamento de Presidencia y Relaciones Institucionales, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ziegler, Sébastien, ed. Internet of Things Security and Data Protection. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04984-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Andrieux, Jean-Yves. Le patrimoine monumental: Sources, objets et représentations. Rennes: Presses universitaires de Rennes, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Spain and Spain. Código de Internet. 3rd ed. Cizur Menor, Navarra: Thomson/Aranzadi, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Internet des objets – Protection":

1

Eswaran, Subha P. "Intelligent Environment Protection." In Internet of Things (IoT), 335–50. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37468-6_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abadi, Martín. "Protection in Programming-Language Translations." In Secure Internet Programming, 19–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48749-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Giannopoulou, Alexandra, and Valeria Ferrari. "Distributed Data Protection and Liability on Blockchains." In Internet Science, 203–11. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17705-8_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Roth, Volker. "Mutual Protection of Co-operating Agents." In Secure Internet Programming, 275–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48749-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rahim, Eva Rose. "Information Security in the Internet Age." In Beyond Data Protection, 157–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33081-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Appleman, Dan. "Passwords: Your Key to the Internet." In Always Use Protection, 159–72. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0904-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Chuan-Kun. "Privacy Protection in IoT Applications." In Internet of Things Security, 137–54. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1372-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moura Vicente, Dário, and Sofia de Vasconcelos Casimiro. "Data Protection in the Internet." In Ius Comparatum - Global Studies in Comparative Law, 611–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-48675-4_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Leonti, Wolfgang C. "Protection of Internet Domain Names." In Key Aspects of German Business Law, 115–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-540-24776-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dhanoa, Amanpreet Singh. "Implementation of Protection Protocols for Security Threats in SDN." In Internet of Things, 247–55. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89328-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Internet des objets – Protection":

1

Fleck, Andreas, and Florian Kammüller. "Implementing Privacy with Erlang Active Objects." In 2010 Fifth International Conference on Internet Monitoring and Protection. IEEE, 2010. http://dx.doi.org/10.1109/icimp.2010.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saiz-Laudo, Raul, and Marc Sanchez-Artigas. "Egeon: Software-Defined Data Protection for Object Storage." In 2022 22nd International Symposium on Cluster, Cloud and Internet Computing (CCGrid). IEEE, 2022. http://dx.doi.org/10.1109/ccgrid54584.2022.00019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Qiu, Zhen, Takeshi Ikenaga, and Satoshi Goto. "Robust Scalable Video Transmission using Object-Oriented Unequal Loss Protection over Internet." In APCCAS 2006 - 2006 IEEE Asia Pacific Conference on Circuits and Systems. IEEE, 2006. http://dx.doi.org/10.1109/apccas.2006.342547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kambovski, Igor. "SIGURNOST ČUVANjA I PRENOSA PODATAKA I INFORMACIJA KOD ELEKTRONSKE TRGOVINE I ELEKTRONSKOG (INTERNET) BANKARSTVA." In XV Majsko savetovanje: Sloboda pružanja usluga i pravna sigurnost. University of Kragujevac, Faculty of Law, 2019. http://dx.doi.org/10.46793/xvmajsko.899k.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Securing transaction and providing secure storage and transmission of information at electronic commerce and electronic banking is a very complex and expensive process. They are based on the establishment of a protected system and a protocol that will be able to identify possible fraud and analyze the risk and loss that can occur. The protection system demands installation of a predefined security mechanism such as access controll, user authentication, encryption of information and establishing of security protocol. Each system which is collecting and storing data and information belongs to the group of threatened system and needs protection. Generally, each person, object or event, which can potentially leads to security breach, can be considered as threat. Such threat may be accidental (unwanted file deletion) or intentionall (malicious modification of sensitive data or hardware system). However, those threats must be identified and prevented, and if they have already succeeded, an appropriatte procedure should be taken for the disposal and minimization of damages.
5

Didero, Rachele, and Giovanni Maria Conti. "CAPABLE: Engineering, textile, and fashion Collaboration, for citizens' Awareness and Privacy Protection." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1001536.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Many private companies and public bodies in authoritarian and democratic states have joined facial recognition technology, used for various purposes. This situation is due to the general absence of a specific regulation that monitors its use. There is no consensus in society regarding the ethics of this technology. Furthermore, there are many doubts concerning the long-term ethical sustainability of facial recognition and its compliance with the law. A problem that emerges from the use of this technology is its obscurity. We do not know who is responsible for the decision automatically made; we do not know how the data is used by those who collect it, how long this data is kept, who can have access to it, to whom it is sent, and how this is used to create a profile. In addition, facial recognition systems are powered by numerous images collected from the Internet and social media without users' permission: it is, therefore, impossible to trace the origin of the data. Consequently, any citizen could be classified, most likely discriminated against, and become the victim of an algorithm. The boundary between security and control is decidedly blurred: many cameras do not respect the privacy of individuals and often harm human rights when they are used to discriminate, accuse, power, and manipulate people. From this discussion on privacy and human rights, it was born first the desire to create awareness, in particular regarding these technologies and the possible issues linked to them. Secondly, it was born the will to create a product that would be the spokesperson for these concerns and allow citizens to protect themselves. On this basis, a collaboration between fashion, engineering, and textile has developed to produce fabric and then garments, which confuse facial recognition systems in real-time. The technological innovation aims to create a system capable of generating adversarial knitted patches that can confuse the systems that capture biometric data. By integrating an adversarial algorithm into their jacquard motifs, the garments prevent the wearers from being identified, preserving their privacy. The adversarial textile is made with computerized knitting machines. Compared to a printed image, knitwear acquires texture, durability, wearability, and practicability. Furthermore, a knitted fabric allows modifying the single yarn material based on the results and performance we want to obtain. These fabrics have been tested on Yolo, the fastest and most advanced algorithm for real-time object recognition. The project was born in New York in 2019; the first experiments with computerized knitting machines were carried out at the Politecnico di Milano in January 2020. The textile was developed in the workshops of the Shenkar College of Tel Aviv. On February 8, 2021, the patent of the industrial process to produce the adversarial knitted textile was filed, with the patronage of the Politecnico di Milano. Today, the research on this fabric and these thematics has carried on within a Ph.D. that combines human-centric design and engineering.
6

Stoica, Marian, Marinela Mircea, and Bogdan Ghilicmicu. "USING BLOCKCHAIN TECHNOLOGY IN SMART UNIVERSITY." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The evolution of information and communications technology (ICT) has a huge impact in all spheres of activity, leading to major changes in every process, gaining important benefits but also facing challenges, especially those related to data security and protection. In the educational sector, there was a switch from traditional university to ICT based university. The use of SOA (Service Oriented Architecture), Cloud Computing, Internet of Things (IoT) and other technologies paves the way to switch to a new stage: intelligent university. Although IoT offers numerous benefits to the educational system, scalability and security of increasing number of objects connected to the network are major challenges. Switching to a decentralized IoT may be a solution for this challenge. Blockchain technology allows decentralization of process management thus being able to solve many of current problems of IoT, especially regarding the security. Also, the grows of e-learning and m-learning sectors requires using technologies that improve the trust and value of distance education. Additionally, increasing amount of electronic content, new law requirements regarding personal data security and protection and storing data in clouds require the adoption of new technologies that can solve current problems (see the Fog Computing paradigm). Blockchain technology may improve the educational system in various aspects, like: trust, collaboration, transparency, data security, issuing and security of certificates, management and protection of intellectual property, fighting intellectual fraud, lifelong high quality education, decentralized education, etc. Use of blockchain technology in educational system is in early stage. Very few universities have started using this technology, most of them only for validation of certificates/diplomas. There are few researches addressing the use of blockchain in education and the benefits and challenges of adopting this technology. This paper approaches three major issues: benefits of adopting blockchain in universities, challenges of adopting blockchain technology in universities, state of using blockchain technology in Romania.
7

Đorđević, Mihailo, Milan Pižurica, Vojkan Nikolić, Anja Kostić – Zobenica, and Sanja Stanisavljev. "Web service protection." In International conference on Applied Internet and Information Technologies. Prof. Sasho Korunovski, PhD, Rector “St Kliment Ohridski” University - Bitola Republic of Macedonia, 2018. http://dx.doi.org/10.20544/aiit2018.p28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

SHishov, E. I., and T. A. Ahmedov. "Copyright and protection on the Internet." In XXI All-Russian Scientific and Practical Conference young scientists, graduate students and students in Neryungri, with international participation. Tekhnicheskogo instituta (f) SVFU, 2020. http://dx.doi.org/10.18411/tifsvfu-2020-c2-157-82.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wu, Lijin, Yaming Zhang, Zehua Shen, Yang Jian, and Longli Tang. "Trustworthy Protection Technology for Industrial Internet." In 2022 9th International Conference on Dependable Systems and Their Applications (DSA). IEEE, 2022. http://dx.doi.org/10.1109/dsa56465.2022.00076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jonker, Mattijs, Anna Sperotto, Roland van Rijswijk-Deij, Ramin Sadre, and Aiko Pras. "Measuring the Adoption of DDoS Protection Services." In IMC 2016: Internet Measurement Conference. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2987443.2987487.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Internet des objets – Protection":

1

Zhuo, Ran, Bradley Huffaker, KC Claffy, and Shane Greenstein. The Impact of the General Data Protection Regulation on Internet Interconnection. Cambridge, MA: National Bureau of Economic Research, November 2019. http://dx.doi.org/10.3386/w26481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cunha e Melo, Mariana, and Jonas de Abreu Castro. Section 230 and the future of the internet. Center for Technology and Public Interest, SL, March 2023. http://dx.doi.org/10.59262/ejp3ba.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The US Supreme Court is considering the fate of Section 230, a law that protects content platforms from liability for user-generated content. The case, Gonzalez v. Google, challenges the intermediary liability protection of Section 230. If the challenge succeeds, it could undermine the foundation of Web 2.0 and the internet's future. The case focuses on whether platforms like Google, Twitter, and TikTok should be held liable for third-party content from their recommendation engines. Challenging Section 230 could have severe consequences for freedom of expression and lead to restrictions on recommendation engines or higher restrictions on publishing or sharing. Section 230 has been settled law for over two decades and protects content platforms, even if they encourage users to post content.
3

Aubry, Philippe, Nicolas Boileau, Marie Briandy, Marie-Christine Chauvat, Sandrine Conin, and Éric Min-Tung. Rapport sur le chantier IdRef en Normandie. Normandie Université, December 2023. http://dx.doi.org/10.51203/rapport.nu.000003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Suivant le développement des systèmes d’information et des plateformes, ouverts ou fermés, les identifiants pour la recherche se sont multipliés. Leur usage ainsi que leur amélioration est un enjeu pour le développement de l’écosystème de la science ouverte, comme l’indique la note d’orientation du Comité pour la science ouverte de 2019. Qu’ils concernent les structures de recherche, les auteurs ou les objets de la recherche, ils sont indispensables pour identifier et être facilement retrouvés sur internet, répondant ainsi au F des principes FAIR. Ces identifiants, nationaux et internationaux, ont été développés pour les besoins d’outils (ex. IdHAL, IdRef), de gestion de la recherche (RNSR) ou pour l’édition scientifique (ex. ORCID, ROR). Certains de ces identifiants sont des prérequis nécessaires pour activer des fonctionnalités associées (création de CV avec HAL et ORCID). Ce foisonnement d’identifiants peut être difficile à suivre et la réalisation d’alignements devient un véritable enjeu pour faire concorder tel auteur ou telle structure à travers plateformes et outils. En Normandie, ces enjeux sont centraux dans les activités liées à la documentation mais aussi à la science ouverte. Ce présent rapport fait état du travail mené par les équipes des services documentaires sur un chantier de nettoyage, d’enrichissement et d’alignements des structures et chercheurs des établissements membres de Normandie Université.
4

Krishnaswamy, Sudhir, and Jayna Kothari. Rights in Review: The Supreme Court in 2015. Centre for Law and Policy Research, January 2016. http://dx.doi.org/10.54999/yvjn7797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Rights in Review is a CLPR publication which analyses 15 key judgments ruled by the Supreme Court in 2015. This publication seeks to acquaint the reader with various aspects of fundamental rights protection and their relevance and impact. The year 2015 saw the Supreme Court extend its scope of protection of fundamental rights to the internet in the case of Shreya Singhal v Union of India. This case struck down Section 66A of the Information Technology Act of 2000.
5

Park, Soontae, Antonio García Zaballos, Enrique Iglesias Rodriguez, Pau Puig Gabarró, Kwanghee Choi, Donghwan Oh, Hyein Song, and Junok Lim. Roadmap for the Establishment of a Big Data Analysis Center for Critical Infrastructure Protection in Latin America and the Caribbean post COVID-19. Inter-American Development Bank, January 2022. http://dx.doi.org/10.18235/0003930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This report, a joint effort between the Korea Internet & Security Agency (KISA) and Inter-American Development Bank (IDB), emphasizes the rising importance of critical infrastructure protection for the Latin American and Caribbean (LAC) region and proposes ways to overcome existing and potential cybersecurity threats. Considering the unexpected and high-speed transformations brought on by the COVID-19 pandemic, it is important to get prepared for imminent threats. The report examines the status of information and communication technology (ICT) infrastructure protection in the region and suggests big data analysis as a solution. To make the case, the report discusses the role of Koreas Big Data Analysis Center in protecting critical infrastructures in the country and makes suggestions to build an institutional foundation, stronger governance, and an effective roadmap for the implementation of a similar center in the LAC region.
6

Jones, Emily, Beatriz Kira, Anna Sands, and Danilo B. Garrido Alves. The UK and Digital Trade: Which way forward? Blavatnik School of Government, February 2021. http://dx.doi.org/10.35489/bsg-wp-2021/038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The internet and digital technologies are upending global trade. Industries and supply chains are being transformed, and the movement of data across borders is now central to the operation of the global economy. Provisions in trade agreements address many aspects of the digital economy – from cross-border data flows, to the protection of citizens’ personal data, and the regulation of the internet and new technologies like artificial intelligence and algorithmic decision-making. The UK government has identified digital trade as a priority in its Global Britain strategy and one of the main sources of economic growth to recover from the pandemic. It wants the UK to play a leading role in setting the international standards and regulations that govern the global digital economy. The regulation of digital trade is a fast-evolving and contentious issue, and the US, European Union (EU), and China have adopted different approaches. Now that the UK has left the EU, it will need to navigate across multiple and often conflicting digital realms. The UK needs to decide which policy objectives it will prioritise, how to regulate the digital economy domestically, and how best to achieve its priorities when negotiating international trade agreements. There is an urgent need to develop a robust, evidence-based approach to the UK’s digital trade strategy that takes into account the perspectives of businesses, workers, and citizens, as well as the approaches of other countries in the global economy. This working paper aims to inform UK policy debates by assessing the state of play in digital trade globally. The authors present a detailed analysis of five policy areas that are central to discussions on digital trade for the UK: cross-border data flows and privacy; internet access and content regulation; intellectual property and innovation; e-commerce (including trade facilitation and consumer protection); and taxation (customs duties on e-commerce and digital services taxes). In each of these areas the authors compare and contrast the approaches taken by the US, EU and China, discuss the public policy implications, and examine the choices facing the UK.
7

Sokolovsky, Dmitry, Sergey Sokolov, and Alexey Rezaykin. e-learning course "Informatics". SIB-Expertise, January 2024. http://dx.doi.org/10.12731/er0785.29012024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The e-learning course "Informatics" is compiled in accordance with the requirements of the Federal State Educational Standard of Higher Education in the specialty 33.05.01 Pharmacy (specialty level), approved by Order of the Ministry of Education and Science of the Russian Federation dated August 11, 2016 No. 1037, and taking into account the requirements of the professional standard 02.006 "Pharmacist", approved by order of the Ministry of Labor and Social Protection No. 91n of the Russian Federation dated March 9, 2016. The purpose of the course is to master the necessary amount of theoretical and practical knowledge in computer science for graduates to master competencies in accordance with the Federal State Educational Standard of Higher Education, capable and ready to perform the work functions required by the professional standard. Course objectives: to provide knowledge about the rules of working with spreadsheets; to provide knowledge about working in medical information systems and the Internet information and telecommunications network; to provide skills in working with computer science software and hardware used at various stages of obtaining and analyzing biomedical information; to learn how to use the knowledge gained to solve problems of pharmaceutical and biomedical content. The labor intensity of the course is 72 hours. The course consists of 12 didactic units.
8

Saha, Devanik. Shockproof and Inclusive Fiscal Policies. Institute of Development Studies, July 2023. http://dx.doi.org/10.19088/core.2023.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Covid-19 pandemic has had a significant impact on the economies of most countries. What differed is the intensity of the impact, which ranged from mild economic contractions to devastating recessions and downturns. From a generic perspective, it is obvious to assume that high-income countries (HIC) would have faced lesser economic destruction than low- and middleincome countries (LMIC). However, a closer examination reveals that there are several factors that determined the impact of the pandemic on a country, as well as influenced its ability to respond. For instance, the existing economic structures and weaknesses strongly affected the countries’ ability to provide adequate fiscal stimulus. These weaknesses are following pro-cyclical policies and not creating fiscal buffers that would help build more resilience. An interesting finding that emerged was that the credit rating of a country was found to be the most important determinant of its Covid-19 fiscal response. This is one major area where HICs had a significant advantage compared to LMICs. Another key challenge that disproportionately affected LMICs was the lack of digitisation and access to the internet, which hampered economic growth as well as affected the countries’ ability to quickly disburse cash transfers and support. Research supported by the Covid-19 Responses for Equity (CORE) Programme – which is supported by the International Development Research Centre (IDRC) – has revealed some emerging lessons and recommendations to address these challenges and improve the resilience of countries to future shocks. One of the first and foremost recommendations is for countries to invest strongly in social protection and healthcare systems for its citizens, which would help build their resilience for future shocks. Adopting free trade policies and avoiding protectionism has also been an important lesson from the pandemic. Another key lesson is to employ a gender lens to fiscal and monetary policies as women have been disproportionately affected by the pandemic. Countries should also adopt expansionary monetary and fiscal policies as far as possible to increase the demand. Finally, countries also need to strengthen their financial institutions and mechanisms and reduce political interference, that would help maintain the asset quality of the banking sector.
9

BACCELLI, François, Sébastien CANDEL, Guy PERRIN, and Jean-Loup PUGET. Large Satellite Constellations: Challenges and Impact. Académie des sciences, March 2024. http://dx.doi.org/10.62686/3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The New Space Age (NewSpace) marks the advent of a new era in the use of space, characterized by the opening of space to new players, the use of new space technologies, new functionalities for satellites in orbit, and the development of satellite constellations, mainly in the fields of communications and Earth observation. These developments are underpinned by first-rate scientific and technological advances, as well as considerable public and private investment, in particular in the USA, China and, to a lesser extent, Europe. Fleets of small low- and medium-orbit satellites are replacing or complementing the large geostationary satellites that predominated in the previous period. Whereas space used to be reserved to a small number of states and major industrial groups, one is now witnessing the emergence of new space states, new industrial groups such as SpaceX or Amazon, and many start-ups. One also observes the emergence of companies with launching and satellite manufacturing capacities, which are also taking on the role of telecommunication operators and content producers. The most visible result of the deployment of these new space networks is the ability to provide high-speed, low-latency Internet connections to any point on the globe. Combined with Earth observation capabilities, these new communications resources also enable real-time action to be taken in any region, including those with no equipment other than terminals. In addition, these space networks are remarkably resilient compared with terrestrial networks. Geostrategic and military considerations combine with rapidly evolving business models to explain the massive investments currently being made in this domain. However, the lack of international regulation in the field is leading to a race to occupy orbits and frequencies, which has already had serious consequences for a whole range of scientific activities. These constellations have a potentially negative impact on astronomy in the visible and infrared optical domains, as well as on radio astronomy. They also raise a major problem in terms of space congestion, with an increase in the amounts of satellite debris resulting from launches or collisions between satellites, and the possibility of reaching a phase of chain reaction collisions. In addition, from an environmental point of view, the consequences of the proliferation of launches and uncontrolled re-entries into the atmosphere are equally worrying. What’s more, the lack of regulation in the field also leads to a loss of sovereignty, since these new satellite communication networks do not comply with any of the rules that states impose on terrestrial communication networks operating on their territories. A sustainable, global solution must be found to these problems, before major and potentially irreversible damage is inflicted on the planet’s environment, geostrategic balances, democracy, and science. While the Acad´emie des Sciences considers that France and Europe need to step up their scientific and industrial actions in this field in order to benefit from the remarkable advances of these new networks, and ultimately leverage the benefits of a resilient and secure communications network, the Acad´emie also recommends working in parallel to strengthen regulation of the field with the aim of assuring sustainable access to orbital and frequency resources, as well as protection for negatively impacted fields, foremost among which are astronomy and the environment.
10

BACCELLI, François, Sébastien CANDEL, Guy PERRIN, and Jean-Loup PUGET. Grandes Constellations de Satellites : Enjeux et Impacts. Académie des sciences, March 2024. http://dx.doi.org/10.62686/2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Le nouvel âge spatial (NewSpace) marque l’avènement d’une ère nouvelle dans l’utilisation de l’espace caractérisée par une ouverture de l’espace à de nouveaux acteurs fondée sur de nouvelles technologies spatiales, par de nouvelles fonctionnalités pour les satellites mis en orbite et par le développement de constellations de satellites, principalement dans les domaines des communications et de l’observation de la Terre. Ces développements s’appuient sur des avancées scientifiques et technologiques de premier plan ainsi que sur des investissements publics et privés considérables, notamment aux États-Unis, en Chine et dans une moindre mesure en Europe. Des flottes de petits satellites en orbite basse ou moyenne viennent remplacer ou s’ajouter aux grands satellites géostationnaires qui prédominaient dans la phase précédente. Alors que l’espace était auparavant réservé à un petit nombre d’États et de grands groupes industriels, on observe actuellement l’émergence de nouveaux États spatiaux, de nouveaux groupes industriels comme SpaceX ou Amazon, ainsi que d’un grand nombre de jeunes pousses. On note l’émergence d’entreprises disposant de capacités de lancement, de fabrication de satellites et qui prennent également le rôle d’opérateurs de télécommunications et de producteurs de contenu. Le résultat le plus visible du déploiement de ces nouveaux réseaux spatiaux est de permettre des connexions Internet à haut débit et faible latence en tout point du globe terrestre. Combinés à des capacités d’observation de la Terre, ces nouveaux moyens de communications permettent aussi d’agir en temps-réel dans toute région, y compris dans celles dépourvues d’équipements autres que les terminaux. Ces réseaux spatiaux ont, de plus, de remarquables propriétés de résilience en comparaison des réseaux terrestres. Des considérations géostratégiques et militaires se combinent donc avec des modèles économiques en évolution rapide pour expliquer les investissements massifs en cours dans ce domaine. Toutefois, l’absence de régulation internationale du domaine conduit à une course pour l’occupation des orbites et des fréquences, course qui a déjà de graves conséquences sur tout un ensemble de domaines. Ces constellations auront potentiellement un impact très négatif sur l’astronomie dans le domaine optique visible et infrarouge ainsi que sur la radioastronomie. Elles posent aussi un problème majeur qui est celui de l’encombrement de l’espace avec l’augmentation du nombre des débris satellisés issus des lancements ou des collisions entre satellites et avec la possible atteinte d’une phase de collisions en chaîne. De plus, d’un point de vue environnemental, les conséquences d’une multiplication des lancements et des rentrées incontrôlées dans l’atmosphère sont, elles aussi, préoccupantes. Par ailleurs, cette absence de régulation du domaine conduit aussi à une perte de souveraineté puisque ces nouveaux réseaux de communications satellitaires n’appliquent aucune des règles que les États imposent aux réseaux de communications terrestres opérant sur leurs territoires. Une solution durable et globale doit être apportée à ces problèmes, avant que des dommages majeurs et potentiellement irréversibles soient infligés à l’environnement de la planète, aux équilibres géostratégiques, à la démocratie et à la science. Si l’Académie des sciences considère que la France et l’Europe doivent renforcer leurs actions scientifiques et industrielles dans ce domaine pour pouvoir bénéficier des avancées remarquables de ces nouveaux réseaux et disposer à terme d’un réseau de communication résilient et sécurisé, elle recommande aussi de travailler en parallèle au renforcement de la régulation du domaine dans le but de garantir un accès durable aux ressources orbitales et fréquentielles, ainsi qu’une protection des domaines négativement impactés, au premier rang desquels l’astronomie et l’environnement.

To the bibliography