Academic literature on the topic 'Logiciel de sécurité'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Logiciel de sécurité.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Logiciel de sécurité"
Alama, Hakim El, Amal Ait Haj Said, and Adnane Benmoussa. "Création d’un logiciel de modélisation en hémovigilance et sécurité transfusionnelle." Transfusion Clinique et Biologique 23, no. 4 (November 2016): 281. http://dx.doi.org/10.1016/j.tracli.2016.08.037.
Full textChemla, Jean-Paul, Matthieu Lescieux, and Bernard Riera. "Un ascenseur miniature jumeau réel d’une maquette numérique." J3eA 22 (2023): 1027. http://dx.doi.org/10.1051/j3ea/20231027.
Full textFréguin-Gresh, Sandrine, Lissania Padilla, Karen Pavon, Douglas Elizondo, Geneviève Cortès, Valentina Banoviez Urrutia, Alissia Lourme Ruiz, Sandrine Dury, and Emmanuelle Bouquet. "Explorer les liens entre agriculture, migration et sécurité alimentaire : une enquête auprès de ménages agricoles diversifiés et multilocalisés du nord-ouest du Nicaragua." Cahiers Agricultures 28 (2019): 9. http://dx.doi.org/10.1051/cagri/2019009.
Full textGaillard, Cédric, Sofyan Martin, Pierre-Marie Bosc, Jalila El-Ati, Marie Claude Dop, Tarek Trabelsi, Marie-Josephe Amiot, and Sandrine Dury. "Explorer les liens entre agriculture et sécurité alimentaire : une enquête auprès des femmes du gouvernorat de Sidi-Bouzid en Tunisie." Cahiers Agricultures 27, no. 1 (January 2018): 15501. http://dx.doi.org/10.1051/cagri/2018005.
Full textHéry, Michel. "Les impacts de l’automatisation du travail." Études Septembre, no. 9 (August 22, 2018): 43–54. http://dx.doi.org/10.3917/etu.4252.0043.
Full textHourenatou, H. "La pratique de l’intelligence economique dans les entreprises au Cameroun : Enjeux et perspectives." Journal of the Cameroon Academy of Sciences 15, no. 3 (August 4, 2020): 181–92. http://dx.doi.org/10.4314/jcas.v15i3.4.
Full textBawè, LD, and Et Al. "Prévalence des marqueurs infectieux chez les donneurs de sang au centre régional de transfusion sanguine de Sokodé." Revue Malienne d'Infectiologie et de Microbiologie 18, no. 2 (January 8, 2024): 26–32. http://dx.doi.org/10.53597/remim.v18i2.2731.
Full textBabio, Soumanou, Alexis Hougni, and Jacob Afouda Yabi. "Sécurité Alimentaire au Bénin: Les Grandes Familles de Pratiques Agro-écologiques Adoptées dans les Zones Cotonnières." European Scientific Journal, ESJ 19, no. 12 (April 29, 2023): 32. http://dx.doi.org/10.19044/esj.2023.v19n12p32.
Full textYEGBEMEY, Rosaine Nérice, Soule El-hadj IMOROU, Dossou Ghislain Boris AÏHOUNTON, Jacob Afouda YABI, Thierry A. KINKPE, and Michel ATCHIKPA. "Déterminants de l’adaptation des agriculteurs aux changements climatiques dans les zones du Nord Bénin et du Sud Niger." Annales de l’Université de Parakou - Série Sciences Naturelles et Agronomie 10, no. 2 (December 31, 2020): 31–42. http://dx.doi.org/10.56109/aup-sna.v10i2.35.
Full textBouras, Samir. "Oncological outcomes of partial nephrectomy." Batna Journal of Medical Sciences (BJMS) 8, no. 1 (June 4, 2021): 9–12. http://dx.doi.org/10.48087/bjmsoa.2021.8102.
Full textDissertations / Theses on the topic "Logiciel de sécurité"
Duc, Guillaume. "Support matériel, logiciel et cryptographique pour une éxécution sécurisée de processus." Télécom Bretagne, 2007. http://www.theses.fr/2007TELB0041.
Full textThe majority of the solutions to the issue of computer security (algorithms, protocols, secure operating systems, applications) are running on insecure hardware architectures that may be vulnerable to physical (bus spying, modification of the memory content, etc. ) or logical (malicious operating system) attacks. Several secure architectures, which are able to protect the confidentiality and the correct execution of programs against such attacks, have been proposed for several years. After the presentation of some cryptographic bases and a review of the main secure architectures proposed in the litterature, we will present the secure architecture CryptoPage. This architecture guarantees the confidentiality of the code and the data of applications and the correct execution against hardware or software attacks. In addition, it also includes a mechanism to reduce the information leakage on the address bus, while keeping reasonable performances. We will also study how to delegate some security operations of the architecture to an untrusted operating system in order to get more flexibility but without compromising the security of thearchitecture. Finally, some other important mechanism are studied: encrypted processid entification, attestations of the results, management of software signals, management of the threads, inter-process communication
Ayrault, Philippe. "Développement de logiciel critique en FoCalize : méthodologie et outils pour l'évaluation de conformité." Paris 6, 2011. http://www.theses.fr/2011PA066120.
Full textPorquet, Joël. "Architecture de sécurité dynamique pour systèmes multiprocesseurs intégrés sur puce." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2010. http://tel.archives-ouvertes.fr/tel-00574088.
Full textHumbert, Sophie. "Déclinaison d'exigences de sécurité, du niveau système vers le niveau logiciel, assistée par des modèles formels." Bordeaux 1, 2008. http://www.theses.fr/2008BOR13580.
Full textKouadri, Mostéfaoui Ghita. "Vers un cadre conceptuel et logiciel intégrant la sécurité basée sur le contexte dans les environnements pervasifs." Paris 6, 2004. http://www.theses.fr/2004PA066392.
Full textBulusu, Sravani Teja. "Méthodologie d'ingénierie des exigences de sécurité réseau." Thesis, Toulouse 3, 2019. http://www.theses.fr/2019TOU30084.
Full textBuilding secure networks is crucial as well as challenging for any organization. Network security majorly concerns the security architectural needs that describe network segmentation (i.e., security zoning); security of network devices connecting the communicating end user systems; and security of the information being transferred across the communication links. Most often, a late consideration of security aspects (i.e., post-deployment of network design) inevitably results in an increase in costs as well as in the complexity to take into account the necessary changes that have be made to the existing infrastructures. In this regard, network security requirements hold a paramount importance since they drive the decisions related to the implementation of security controls about business needs. Indeed, bad network security requirements can lead to ineffective and costly security or worth security holes in the network security design. Nevertheless, current security requirement engineering methodologies render no support to derive network security requirements. This thesis work is a part of the research project DGA IREHDO2 (Intégration REseau Haut Débit embarqué Optique 2ème phase) that concerns aircrafts future generation networks. Our work is done mainly in collaboration with AIRBUS and is related to the security requirements engineering process for aircraft networks. Our objective in this project is to propose an SRE methodology for capturing and analysing network security requirements, and that facilitates the refinement into network security and monitoring configurations (TOP/DOWN approach). The complexity addressed comes at a time from the differences in point of view: i) with regard to the understanding of the issue of security by different stakeholders, ii) the nature of the systems impacted and the variability of the levels of abstraction in the network development cycle. In this work, we defined SRE methodology based on the abstraction levels proposed by SABSA (Sherwood Applied Business Security Architecture) method in order to structure the refinement activity of business needs into network security requirements. Indeed, SABSA recommends the expression of the needs considering the Business view (decision makers), Architect's view (objectives, risks, processes, applications and interactions), Designer's view (security services), Builder's view (security mechanisms) and Tradesman's view (products, tools, technologies). We considered the first three views. We express the business and architect's views using STS (Social-Technical Systems) formalism. We also propose to represent attacks as multi-agent systems to facilitate the analysis of security risks at these first two views. For expressing the network security requirements captured at Designer's view, we propose a methodology that automates parts of the process of security zoning and network security requirements elicitation using a definite set of formalized rules derived from security design principles and formal integrity models. We developed a tool that implements these rules in ASP (Answer set programming), which facilitates calculating cost-optimal security zone models. In the end, to ensure traceability between the three views, we defined a new modelling notation based on the concepts proposed in KAOS (Keep All Objectives Satisfied) and STS. We illustrate our methodology using a scenario specific to the IRHEDO2 project. Finally, we evaluate our methodology using: 1) an e-commerce enterprise case study; 2) a new scenario specific to the IRHEDO2 project
Mahmalgi, Ammar. "Étude et réalisation d'un testeur de logiciel pour microcontrôleur : contribution à la mise en sécurité d'un système microprogramme." Lille 1, 1987. http://www.theses.fr/1987LIL10088.
Full textChollet, Stéphanie. "Orchestration de services hétérogènes et sécurisés." Grenoble 1, 2009. http://www.theses.fr/2009GRE10283.
Full textService-oriented Computing (SOC) has appeared recently as a new software engineering paradigm. The very purpose of this reuse-based approach is to build applications through the late composition of independent software elements, called services, which are made available at run-time by internal or external providers. SOC brings properties of major interest. First, it supports rapid application development. Using existing, already tested, services is likely to reduce the time needed to build up an application and the overall quality of this application. SOC also improves software flexibility through late binding. A service to be used by an application is chosen at the last moment, based on its actual availability and on its properties at that moment. The service orientation has also to face thorny problems, as in any reuse-based approach. In this work, we focus on two major issues: the integration of heterogeneous service-oriented technologies and the management of security aspects when invoking a service. Security is actually a major concern to SOC practitioners. SOC technologies have allowed companies to expose applications, internally and externally, and, for that reason are heavily used. However, in some distributed environments, software services and process engines can be alarmingly vulnerable. Service-based processes can expose organizations to a considerable amount of security risk and dependability degradation. We propose to use a model-driven approach for solving this problem. During system design, paradigms such as abstraction, separation of concerns and language definition are used to define a model of the service composition with security properties. This model is transformed into an execution model. We present a generative environment applying these principles for service composition. This environment has been built as part of the SODA European project and validated on several industrial use cases
Mouelhi, Tejeddine. "Modélisation et test de mécanismes de sécurité dans des applications internet." Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-00544431.
Full textParrend, Pierre. "Software security models for service-oriented programming (SOP) platforms." Lyon, INSA, 2008. http://theses.insa-lyon.fr/publication/2008ISAL0117/these.pdf.
Full textLes plates-formes à composants de service (SOP pour Service-oriented Programming) sont des environnements d’exécution génériques qui garantissent des applications conçues selon un modèle architectural propre. Cependant, peu d’outils existent pour garantir l’innocuité des composants installés. Nous proposons par conséquent d’adapter les méthodes d’Assurance de Sécurité Logicielle pour les plates-formes SOP, d’effectuer une analyse de sécurité correspondante et de fournir des mécanismes de protection adaptés. Les mécanismes de protection proposés sont OSGi Robuste (Hardened OSGi), un ensemble de recommandations pour l’implémentation de plates-formes OSGi, CBAC (Component-based Access Control), un mécanisme de contrôle d’accès flexible mis en œuvre à l’installation, et WCA (Weak Component Analysis) qui identifie les vulnérabilités exploitables dans les composants SOP selon l’exposition du code. CBAC et WCA utilisent l’analyse statique du Bytecode pour automatiser la validation des composants lors de leur installation
Books on the topic "Logiciel de sécurité"
Lucas, Michael. PGP & GPG: Assurer la confidentialite de son courrier e lectronique. Paris: E ditions Eyrolles, 2006.
Find full textLucas, Michael. PGP & GPG: Email for the practical paranoid. San Francisco, CA: No Starch Press, 2006.
Find full textLucas, Michael. PGP & GPG: Assurer la confidentialité de son courrier électronique. Paris: Eyrolles, 2006.
Find full textSecrets and lies: Digital security in a networked world. New York: John Wiley, 2000.
Find full textModsecurity handbook. 2nd ed. London: Feisty Duck, 2010.
Find full textEuropean Dependable Computing Conference (1st 1994 Berlin, Germany). Dependable computing--EDCC-1: First European Dependable Computing Conference, Berlin, Germany, October 4-6, 1994 : proceedings. Berlin: Springer-Verlag, 1994.
Find full text1937-, Laurie Peter, ed. Apache: The definitive guide. 2nd ed. Beijing: O'Reilly, 1999.
Find full text1937-, Laurie Peter, ed. Apache: The definitive guide. Cambridge [Mass.]: O'Reilly & Associates, Inc., 1997.
Find full text1937-, Laurie Peter, ed. Apache: The Definitive Guide. 3rd ed. Sebastopol, CA: O'Reilly, 2003.
Find full text1970-, Amyot Daniel, and Williams Alan W, eds. System analysis and modeling: 4th international SDL and MSC workshop, SAM 2004, Ottawa, Canada, June 1-4, 2004 : revised selected papers. Berlin: Springer, 2005.
Find full textBook chapters on the topic "Logiciel de sécurité"
"Déni de service et l’attaque ReDoS." In La sécurité logicielle: une approche défensive, 211–34. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.9.
Full text"Table of Contents." In La sécurité logicielle: une approche défensive, VII—XII. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.2.
Full text"Index." In La sécurité logicielle: une approche défensive, 287–91. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.13.
Full text"La génération des nombres aléatoires." In La sécurité logicielle: une approche défensive, 133–72. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.7.
Full text"Études de cas." In La sécurité logicielle: une approche défensive, 255–84. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.11.
Full text"Le contrôle d’accès et la sécurité du système d’exploitation." In La sécurité logicielle: une approche défensive, 235–54. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.10.
Full text"Glossaire." In La sécurité logicielle: une approche défensive, 285–86. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.12.
Full text"Le buffer overflow ou « dépassement de tampon »." In La sécurité logicielle: une approche défensive, 55–132. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.6.
Full text"Principes de base de la sécurité de l’information." In La sécurité logicielle: une approche défensive, 15–54. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.5.
Full text"Front Matter." In La sécurité logicielle: une approche défensive, I—VI. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.1.
Full text