Dissertations / Theses on the topic 'Montagnes – Mesures de sécurité'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Montagnes – Mesures de sécurité.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Seigneur, Viviane. "La sécurité en haute montagne : penser la sécurité, jugement de fait, jugement de valeur...et autres jugements : approche anthropologique et sociologique." Rouen, 2003. http://www.theses.fr/2003ROUEL448.
Full textThe subject of this thesis is security in high mountain. This work reveals how the security initiatives are built and what the regulation mechanics are. With this aim in view, the research focus on the knowledge which influences on this mechanisms. This knowledge is studied from three points of view. The first one is about the daily life, the second one is about the institutional world and the last one is about the general relationships with risk. Moreover, this research studies the weight of the "non rationals logics" as opposed to "interests logics" (more or less economics) which influence the collective organisation of security. The high mountain is a good illustration with its little economic stakes, a limited scientific knowledge and a very strong mythical potential. The socio-anthropological approach is particularly interesting to identify this different "non rational" dynamisms
Girard, Antoine. "De la perception des risques à la construction de la sécurité dans le métier de guide de haute montagne : prendre et faire prendre des risques en sécurité." Electronic Thesis or Diss., Université Grenoble Alpes, 2024. http://www.theses.fr/2024GRALH034.
Full textThis research adresses safety issues in craft activities. Drawing on a study of the mountain guide profession, an archetypal craft system, it aims to provide a better understanding of the way in which safety can be constructed in this type of system, which is still relatively unexplored. Our work focuses on analyzing how self-employed guides constantly regulate their risk-taking in the face of natural hazards, while taking into account the other dimensions of their activity (economic, service, social, etc.). The aim is then to propose a prevention strategy that encourages this natural regulation. The thesis assumes that the construction of safety in a craft system calls for the development of both the ‘know-how‘ and the ‘capability' of professionals. By adopting an adaptative, systemic approach to safety, we rely on the responsibility, autonomy and empowerment of professionals, who remain the only ones competent to take decisions in a work situation. Ergonomic action must therefore promote the contribution of all levels of the system (macro, meso, micro) to the construction of an enabling environment that allows actors and collectives to “act safely”.Four empirical studies have been carried out to support this thesis. These are based on data gathered from semi-structured interviews and filmed participant observations of alpine tours with mountain guides. Each of these studies is based on a specific method of data analysis. The first study analyzes the risk perception of mountain guides. It characterizes the risks to which guides and their clients are exposed. It reveals that an alpine tour involves managing both endogenous risks, which depend on the activity of the climbing team, and exogenous risks, which refer to the intrinsic dynamics of the work environment. The second study focuses on the preparation of the alpine tour. It shows that this preparation can be approached as a design activity aimed at constructing a space of acceptable situations integrating endogenous and exogenous risks. The third study focuses on the realization of the alpine tour. Based on the theoretical framework of the management of dynamic situations, it examines how guides construct situation awareness, develop plans in action and act to maintain themselves in a space of acceptable situations. Finally, the fourth study focuses on the “risky trade-offs” that can be observed in the work. It aims better understand the mechanisms that can lead guides to take risks, at all stages of the alpine tour, but also on a season-long or career-long perspective. This latest study shows that trade-off processes aim to permanently hold different compromises between all the resources and constraints of situations. It shows that one of the main safety issues concerns the management of these risky trade-offs, to prevent risk-taking from getting out of control over time.Our results can therefore be summarized as follows: “Mountain guides have to manage endogenous and exogenous risks, in order to place themselves in a space of acceptable situations and maintain themselves there dynamically, while avoiding risk-taking excesses”. These results enable us to propose an explanation for accidents based on risk-taking. They also suggest new ways of preventing accidents, based not on controlling the sequence of events in the alpine tour, but on managing the mechanisms that can lead to an accumulation of risk-taking
Poizat, Dominique. "Les enjeux de l'information dans la prévention des accidents liés à la pratique des sports d'hiver." Grenoble 3, 2001. http://www.theses.fr/2001GRE39027.
Full textHadhiri, Amine. "Sécurité des applications androïde : menaces et contre-mesures." Mémoire, École de technologie supérieure, 2012. http://espace.etsmtl.ca/1008/1/HADHIRI_Amine.pdf.
Full textZargouni, Yadh. "Évaluation de l'efficacité des mesures de sécurité routière." Paris 6, 1986. http://www.theses.fr/1986PA066194.
Full textNascimento, Adelaïde. "Produire la santé, produire la sécurité : développer une culture collective de sécurité en radiothérapie." Paris, CNAM, 2009. http://www.theses.fr/2009CNAM0669.
Full textCette thèse porte sur la sécurité des patients, plus particulièrement dans le domaine de la radiothérapie, spécialité médicale qui utilise des rayonnements ionisants pour le traitement des cancers. L’objectif de cette thèse est d’apporter des éléments de compréhension sur la gestion de la sécurité en radiothérapie et de fournir des pistes d’amélioration de la sécurité des patients, au travers du développement de la culture collective de sécurité. Pour ce faire, trois études empiriques ont été conduites : dans un premier temps, 14 sujets (médecins, physiciens médicaux, dosimétristes et manipulatrices) ont analysé des situations d’écart à la norme ; dans un second temps, l’activité des manipulatrices a été analysée au moyen d'observations in situ ; dans un dernier temps, 14 physiciens médicaux ont pu, via des allo-confrontations individuelles, commenter des dosimétries réalisées par leurs confrères. Cette thèse débouche sur une vision de la sécurité totale qui articule qualité et sécurité – réglées ou gérées – où la qualité est tributaire de la sécurité. Les résultats ont montré le manque de procédures formelles relatives à la sécurité des patients et l’existence de sous-cultures de sécurité propres aux professions et aux établissements ; En plus, les données indiquent que la sécurité totale repose en partie sur la connaissance du travail des collègues. De manière générale et de façon à pouvoir assurer la sécurité totale, c’est-à-dire la production de la qualité (santé) en sécurité, il faut accorder aux organisations des ressources matérielles et humaines ainsi qu’une place au développement du collectif et de l’organisation prescrite
Lanneau-Sebert, Mathilde. "La mise en oeuvre du droit de la sécurité maritime." Nantes, 2006. http://www.theses.fr/2006NANT4029.
Full textFor a long time, safety has always been taking into account only by sailors or people which have interest in maritime trade. The enacted rules regarding in this domain have been designed from this simplistic scheme. They resolved the consequences of the events between all the interested parties involved in the expedition, they proposed solutions which weighed up the interest of each of them, as well as the risks taken. The sea traffic has become more intense and more dangerous as a result of the technologic progress, the rise of the maritime transport and the development of those carrying dangerous goods. Sea events involving ships carrying dangerous and polluting goods have forced terrestrial and maritime societies to think about insafety reasons, to find better solutions and to treat those consequences. The result was to show that maritime safety laws are rich and full, but their efficiency are compromised because of deficient implementation. Some flag States, whereas they are the main skilled entities, adopted latitudinarianism behaviour, obliging coastal States to extend their competences in order to supply themselves for their own territory. The study concentrates on the evolution of the balance between prerogatives hold by flag States and coastal States, in order to assess the improvement of maritime safety
Wioland, Liên. "Etudes sur la protection et détection des erreurs, contribution au modèle écologique de sécurité." Paris 5, 1997. http://www.theses.fr/1997PA05H092.
Full textIt contains 4 parts, - the first one is a theorical chapter (from human error to the model of ecological safety), - the second one concerns an experiment in a micro-world (situation of air trafic control) to study the mechanisms underlying this model (the main mechanismes are detection, recovery and protection) - the third one is related to the study of 2 ways to improve the effenciency of this ecological safety - a human assistance (by an outside observer, this is not a cooperation or a collective situation) - to improve these mechanisms by a human factors education training (a group of pilots trainees have been educated and we have compared their performance with those of a group control) - the last one is a discussion about this model and this work
Signorello, Patrick. "Sécurité et société : conceptions et pratiques de la sécurité dans les Instructions officielles de l'E.P.S." Paris 5, 2007. http://www.theses.fr/2007PA05H083.
Full textThe subject of this study deals with the evolution of the concept of safety through the prism of the official directives concerning physical and sports education. It rests on the assumption that this semantic evolution has an impact on physical practices as well as on teaching attitudes. The study centered around three poles of research. The first pole, based on the history of physical education raises the question of the relationship of this discipline with the institutions which govern it in order to determine the sociopolitical influences. The second pole deals with the study of the pertinent legislation to determine the various meanings of the word safety often revealed by the related official directives which are binding on the sports educators. Finally, the third pole is articulated with the preceding two by an analysis of the civil and/or criminal liability related to accidents and to the people involved. A cross analysis of these three poles makes it possible to understand the political and institutional bases which are driving the transformations and evolutions of the concept of safety. The study results show the changes of the meaning of the word safety are revealed at the same time by a synchronic dimension related to the institution governing physical education but also by a diachronic dimension resulting from the political context of the time. Thus the word safety could mean the defense of the Nation or the protection of health but more recently the absence of the risk of accidents. The development of technologies, the refusal of risk and the increase in litigation are factors of progress which place individual and collective liability at the cornerstone of a risk free corporation whose two pillars consist of prevention and indemnification. Physical education, as a social but also educational practice is placed at the heart of these influences. As a result, it must modify its teaching methods and adapt its practices with two objectives in mind: 1. To progress with societal changes 2. To respond to the educational goals set by the Ministry of Education. (Education Nationale). Consequently the integration of the concept of risk, resulting from the professional practices of the industrial world, with teaching methods seems to be the answer to a modern world influenced by the principle of precaution
Vache, Géraldine. "Evaluation quantitative de la sécurité informatique : approche par les vulnérabilités." Toulouse, INSA, 2009. http://eprint.insa-toulouse.fr/archive/00000356/.
Full textThis thesis presents a new approach for quantitative security evaluation for computer systems. The main objective of this work is to define and evaluate several quantitative measures. These measures are probabilistic and aim at quantifying the environment influence on the computer system security considering vulnerabilities. Initially, we identified the three factors that have a high influence on system state: 1) the vulnerability life cycle, 2) the attacker behaviour and 3) the administrator behaviour. We studied these three factors and their interdependencies and distinguished two main scenarios based on nature of vulnerability discovery, i. E. Malicious or non malicious. This step allowed us to identify the different states of the system considering the vulnerability exploitation process and to define four measures relating to the states of the system: vulnerable, exposed, compromised, patched and secure. To evaluate these measures, we modelled the process of system compromising by vulnerability exploitation. Afterwards, we characterized the vulnerability life cycle events quantitatively, using real data from a vulnerability database, in order to assign realistic values to the parameters of the models. The simulation of these models enabled to obtain the values of the four measures we had defined. Finally, we studied how to extend the modelling to consider several vulnerabilities. So, this approach allows the evaluation of measures quantifying the influences of several factors on the system security
Diaz, Frédéric. "Coproduction de la sécurité : un nouveau mode de contrôle et de régulation sociale : la gestion des risques dans les espaces privés lors de manifestations sportives et culturelles." Versailles-St Quentin en Yvelines, 2003. http://www.theses.fr/2003VERS018S.
Full textMendy, Norbert Lucien. "Les attaques et la sécurité des systèmes informatiques." Paris 8, 2006. http://www.theses.fr/2006PA082735.
Full textHacking activities appeared around 1980 with first personal computers and since did not stop developing. At the beginning, this practice was primarily individual and playful. Now it is mainly made up by the activities of groups, with very various motivations. Today, due to the development of electronic means of communication, data security concerns a wider public. This thesis examines initially, from a technical and sociological point of view, attacks and defense mechanisms, and proposes a new concept of the security which is not only any centered on technical solutions but also takes in consideration the social dimension of the problem
Disson, Eric. "Sécurité des accès dans les systèmes d'information coopératifs." Lyon 3, 2001. http://www.theses.fr/2001LYO33032.
Full textShikfa, Abdullatif. "Sécurité des communications opportunistes." Paris, Télécom ParisTech, 2010. http://www.theses.fr/2010ENST0045.
Full textIn this thesis, we investigate security in opportunistic communications. This new communication paradigm involves storing and carrying messages in addition to forwarding and impacts all security aspects of communication. Indeed, nodes’ high mobility implies that security solutions should be dynamic and local. Furthermore, delay tolerance, which is one of the main characteristics of opportunistic networks, has a strong impact from a security perspective as it amounts to the infeasibility of interactive protocols. Moreover, radically new forwarding strategies have been proposed to enable communication in opportunistic networks: parting from traditional network addresses, these enriched forwarding strategies use information such as context of a node or content of a message to take forwarding decisions. Context or content are sensitive information that users might not want to reveal to others in order to preserve their privacy, hence these information should be carefully handled to ensure their secrecy. The conflicting requirements between security and forwarding motivate the need for new security mechanisms that enable computation on encrypted data. After analyzing the security challenges in opportunistic communications, we propose a complete security framework for context-based communication. This framework features not only data confidentiality and user privacy, but also computation assurance, which provides resilience against malicious entities aiming at disrupting or subverting the communication. We also propose a privacy-preserving content-based protocol which relies on multiple encryption layers, and an associated local and topology-dependent key management solution
Luo, Zhengqin. "Sémantique et sécurité des applications Web." Nice, 2011. http://www.theses.fr/2011NICE4058.
Full textIn this work we study the formal semantics and security problems of Web applications. The thesis is divided into three parts. The first part proposes a small-step operational semantics for a multitier programing language HOP, which can be used to globally reasoning about Web applications. The semantics covers a core of the HOP language, including dynamic generations of client code, and interactions between servers and clients. The second part studies a new technique to automatically prevent code injection attacks, based on multitier compilation. We add a new phase in the compiler to compare the intended and the actual syntax structure of the output. The validity of our technique is proved correct in the operational semantics of HOP. The last part of the thesis studies Mashic, a source-to-source compiler of JavaScript to isolate untrusted script by ifram sandbox and postmessage in HTML5. The compiler is proved correct in a formal semantics of JavaScript
El, Mariky Mohammed Rida. "Les incidences juridiques du traitement de la sécurité maritime par le code ISM." Aix-Marseille 3, 2009. http://www.theses.fr/2009AIX32013.
Full textUntil recently, the international maritime community has approached maritime safety from a predominantly engineering and technological solutions to promote safety, chiefly trough prescriptive regulations. However, this approach failed to reach the aimed goal. Following analysis of marine disasters such as the Herald of Free Enterprise, Braer, Estonia and Joola, the international marine community concluded that vessel safety could be enhanced by establishing improved ship operation practices and procedures. The effective use of a safety management system specifically enhances the ability of a company’s shore-based personnel to respond to vessel operational needs and emergencies. Safe operating practices, implemented through documented ISM Code procedures and company policies, are expected to provide improved ship safety. These are the goal and the philosophy of ISM Code. All persons involved, directly or indirectly, by the implementation of the ISM Code must understand that this latter is not a lighthouse leading to increase litigation or prosecution but rather than reducing accidents from which litigation results. Nevertheless, any ISM non-conformity may lead to many legal implications in many areas such as withdrawal of certificates, refusal to entry port, ship detention, evidence of breach of contractual obligations, loss of insurance cover, denial of P & I Clubs membership and facilitating criminal prosecution. Even though the entry into force of the ISM Code elevates the requirements of seaworthiness, widens the category of persons who may be held liable for deficiency in safe operations of ships and increase prosecutions, the ISM Code should be seen from its bright side. As for its legal implications, they seem fair and reasonably proportionate in achieving shipping safety management goals
Gharout, Saïd. "Sécurité des communications dans les groupes dynamiques." Compiègne, 2009. http://www.theses.fr/2009COMP1841.
Full textGroup-oriented services are among the emerging technologies of the last few years. The advantages of using IP multicast in group communications, such as saving bandwidth, simplicity and efficiency are typically interesting for new services combining voice, video and text over Internet. Group key management, which is an important building block in securing group communications, has received a particular attention in both academic and industry research communities. This is due to the economical relevance of group-based applications, such as video on demand, videoconferencing, collaborative work. The key management concerns the distribution and updates of the key material each time a member joins or leaves the group. The dynamic aspect of group applications due to free membership joins and leaves in addition to members' mobility makes difficult the design of efficient and scalable key management protocols. In this thesis we deal with the security issue of communication in dynamic groups. We present a detailed analysis of the problem while highlighting special features and issues inherent to the group communication nature. Then, we review existing solutions in the literature and analyze their advantages and shortcomings. Finally, we provide our own original proposals, depicting their advantages over the existing solutions
Cormier, Alexandre. "Modélisaton et sécurité des réseaux." Thesis, Université Laval, 2007. http://www.theses.ulaval.ca/2007/25012/25012.pdf.
Full textMohamed, El-Marouf Ahmed. "Mesure de distance entre politiques de sécurité dans un service Web." Master's thesis, Université Laval, 2015. http://hdl.handle.net/20.500.11794/25929.
Full textThe main contribution of this paper is to suggest a new method to measure the similarity between security policies written in XACML. This is done in two steps: first the safety policy is formalized in SPL, secondly the results will be used to measure the distance between policies. The choice of the distance to use depends on the types of predicates (categorical or numeric). Thus, a synthetic table is provided to link the different metrics that are calculated in accordance with their predicate. A prototype has been coded in PHP and implemented to validate our contribution. Recommendations were issued in conclusion to enrich the proposed approach.
Saleh, Hayder. "Une architecture novatrice de sécurité à base de carte à puce Internet." Versailles-St Quentin en Yvelines, 2002. http://www.theses.fr/2002VERSA009.
Full textAntakly, Dimitri. "Apprentissage et vérification statistique pour la sécurité." Thesis, Nantes, 2020. http://www.theses.fr/2020NANT4015.
Full textThe main objective of this thesis is to combine the advantages of probabilistic graphical model learning and formal verification in order to build a novel strategy for security assessments. The second objective is to assess the security of a given system by verifying whether it satisfies given properties and, if not, how far is it from satisfying them. We are interested in performing formal verification of this system based on event sequences collected from its execution. Consequently, we propose a model-based approach where a Recursive Timescale Graphical Event Model (RTGEM), learned from the event streams, is considered to be representative of the underlying system. This model is then used to check a security property. If the property is not verified, we propose a search methodology to find another close model that satisfies it. We discuss and justify the different techniques we use in our approach and we adapt a distance measure between Graphical Event Models. The distance measure between the learned "fittest" model and the found proximal secure model gives an insight on how far our real system is from verifying the given property. For the sake of completeness, we propose series of experiments on synthetic data allowing to provide experimental evidence that we can attain the desired goals
Benali, Fatiha. "Modélisation et classification automatique des informations de sécurité." Lyon, INSA, 2009. http://theses.insa-lyon.fr/publication/2009ISAL0007/these.pdf.
Full textThe security of the Information System(IS) has become an important strategic issue. Currently, organizations or companies are evolving and have multiple nodes running multiple systems. These organizations are deploying multiple security devices and offer different services to their users. Services, resources and equipment deployed may be the targets for intruders. Interoperability between products to monitoring the IS is absolutely necessary. We present in our work an architecture for intrusion detection system based on interoperability between different products (security and management) and services deployed in an organization. This architecture will provide a comprehensive and meets the current needs of the security administrator. Intrusion detection in this context is to analyze the information (alerts and events) generated from all these devices to prevent any action not legally permitted. The process of analyzing information security faced serious problems because of the heterogeneity of the mechanisms involved in the monitoring of the IS and because of the lack of standard to presents of such information. The thesis is part of the modeling of security information to address the problem of the heterogeneity of the products, allowing the management process of information security (such as intrusion detection or the search for causes of a security incident) to be operational and efficient. The first part of the thesis proposes a solution for modeling the semantics of information security through an ontology. The purpose of the ontology is to describe in a uniform manner the semantics for all activities that may be made by users of IS, regardless of the products involved in the supervision of an IS, and focusing on the concepts of knowledge for mechanisms for processing such information. The implementation of the ontology is to make a classification of events and alerts generated by the monitoring products, in categories that were described by the ontology. The second part of the thesis focuses on automating the classification of security messages. As we have a corpus of previously classified messages, therefore we are interested in the techniques for automatic categorization of text (CT). These techniques are based on machine learning methods. The proposed classification process consists of two stages. The first step allows the data preparation and representation in a format usable by the classification algorithms. The second step aims to implement the algorithms machine learning on information security preprocessed. The application of the solutions proposed in the thesis is on a basis of alerts and events provided by the company Exaprotect (a publisher of software security)
Kreipe, Nils. "Les "autorisations" données par le Conseil de sécurité à des mesures militaires." Paris 10, 2004. http://www.theses.fr/2004PA100183.
Full textIt is generally acknowledged that the Security Council can "authorize" the recourse to armed force, and that such "authorization" provides sufficient legal basis for military measures. However, no satisfactory explanation of the "authorization" has yet been developed. Actually, the "authorization" is not to be regarded as a "permission" of recourse to armed force, exempting the States of the respect of the prohibition of the military coercion (article 2 (4) of the Charter). Rather, it reminds the concept of agency, the "authorization" providing a mandate that enables States to undertake military enforcement measures on behalf of the Council. "Authorized" States thus exercise the Security Council's powers of military coercion. The cases of Kosovo and Iraq show that it is conceivable that the Security Council can grant such a mandate implicitly, and that he can also "ratify" military measures ex post
Fontaine, Jonathan. "Optimisation de l’insertion de contre-mesures pour la sécurité des circuits intégrés." Electronic Thesis or Diss., Sorbonne université, 2024. http://www.theses.fr/2024SORUS058.
Full textOver the last 75 years, the electronics industry has experienced a spectacular evolution, moving from manual design to an automated industry. This industrialization has led to increased complexity in circuits, requiring specialization in tasks during the design of electronic circuits. Various companies around the world have emerged to perform these tasks, with varying levels of trust assigned. From a designer's perspective, these actors pose several threats, such as the insertion of malicious functionalities, intellectual property theft, or circuit counterfeiting. These threats impact the economy of the semiconductor industry, amounting to billions of dollars in losses annually.One way to combat these threats is to lock the circuit with a key, preventing it from functioning correctly if the right key is not present. Logic locking is a method that involves logically locking a circuit using key gates and the corresponding digital key. Several implementations of logic locking have been developed. In these works, we focus on Strong Logic Locking. It locks the circuit by connecting XOR/XNOR gates to the digital key, inserted in circuit signals. Each insertion position has a different impact on security, which is the possibility of recovering the digital key. However, adding logic gates in a circuit increases power consumption, the circuit's area, and decreases performance. Strong logic locking aims to maximize the security of the lock by identifying positions that enhance security, regardless of the resulting impact.In this thesis, we seek to optimize security while considering the impact on circuit performance. We propose a new approach to solving strong logic locking. We start by formulating our security problem based on mathematical models that include security for optimally inserting key gates in the circuit. This formulation calculates the cliques of a subgraph representing the insertion positions. We establish a branch and bound solving algorithm for our problem and evaluate it. We then present a second mathematical models representing the impact on the delay from inserting key gates in the circuit. Finaly, we propose strategies to optimize security while limiting the impact on circuit performance. Our tools are integrated into the design flow, allowing us to validate them with numerical results obtained on circuits used by the electronic community
Seurin, Yannick. "Primitives et protocoles cryptographiques à sécurité prouvée." Versailles-St Quentin en Yvelines, 2009. http://www.theses.fr/2009VERS0009.
Full textWe study the relation between the random oracle model and the ideal block cipher model. We prove that these two models are equivalent: the existence of a cryptosystem secure in one of the models implies the existence of a cryptosystem secure in the other model. We prove that if a cryptosystem using an ideal block cipher is secure, then this cryptosystem remains secure when the block cipher is replaced by the Luby-Rackoff construction with 6 rounds where the inner functions are publicly accessible. Then, we study cryptographic protocols based on the LPN problem. The authentication protocol HB+ aroused much interest and several variants seeking to reinforce the security of this protocol were subsequently proposed. We present a cryptanalysis of three of these variants, and then we propose the protocol HB#. We also propose a probabilistic symmetric encryption scheme whose security against chosen plaintext attacks can be reduced to the difficulty of the LPN problem
Kyriakopoulos, Georges D. "La sécurité de l'aviation civile en droit international public." Paris 2, 1998. http://www.theses.fr/1998PA020020.
Full textBeside the aircraft aeronautical accidents, civil aviation is also threatened by acts of unlawful interference - aircraft hijacking, destruction of aircraft in flight, and unlawful acts of violence at airports. In order to suppress these offences, the tokyo, hague and montreal conventions have been adopted. Suppression in this field is fortified by the application of said conventions in national laws, by the adoption of additional measures - legal and technical ones, in order to also prevent acts of unlawful interference - , as also by the application of other international instruments related to international terrorism. Sometimes, states have intervened by force in order to free passengers kept as hostages ; the question of imposing collective sanctions against states found in default of their obligations was also posed. On the other hand, the security of civil aviation can be endangered by state activities : as far as interception of civil aircraft in national and international airspace is concerned, legal and technical detailed measures have been adopted, in conformity with the humanitarian limits imposed by international law. Regarding military activities presenting a danger for civil aviation, a civil/military coordination was necessary. In order to implement this coordination, icao adopted concrete measures, which are contained in annex 11 to chicago convention. Finally, even in case of armed conflict, civil aviation must be protected: the suspension of the chicago convention in case of war, in accordance with article 89 of this instrument, does not affect the international rules on aviation security ; nevertheless, even apart from the chicago convention, the obligation to protect civil aviation is always valid - not only on the basis of principles as the protection of human life, or the prohibition of the use of arms against civil aircraft, but also according to the principles of the traditional law of armed conflict and of those of the contemporary humanitarian law
Pascual, Nathalie. "Horloges de synchronisation pour systèmes haute sécurité." Montpellier 2, 1992. http://www.theses.fr/1992MON20145.
Full textZnaidi, Wassim. "Quelques propositions de solutions pour la sécurité des réseaux de capteurs sans fil." Lyon, INSA, 2010. http://theses.insa-lyon.fr/publication/2010ISAL0083/these.pdf.
Full textThe self-organized growth of three-dimensional (3D) quantum dots has attracted a lot of interest for their potential applications in ptoelectronic and in nanophotonic devices. In this work, we study by optical spectroscopy lnAs/lnP and lnAs/GaAs quantum dots grown by molecular beam epitaxy (MBE) using the Stanski-Krastanov (SK) growth mode. The quantum dots are then embedded in an electric-field tunable device called « nanopixel ». Ln the case of the lnAs/lnP quantum dots, we focused on the impact of growth conditions like the cap thickness of the double cap process on the emission energy, the influence of the first cap, temperature effect and the exciton-biexciton system. In the case of lnAs/GaAs system, we studied the impact of the capping layer, the excited level sates, the excitonbi-exciton system, and the impact of temperature. We successfully fabricated nanopixels including a quantum dots layer inside the intrinsic region of a Schottky diode. First results showing the effect of an electric field on a single quantum dot emission are finally described
Chevallier-Mames, Benoit. "Cryptographie à clé publique : constructions et preuves de sécurité." Paris 7, 2006. http://www.theses.fr/2006PA077008.
Full textThe public key cryptography concept, proposed by Whitfield Diffie et Martin Hellman, changed the cryptology world. After the description of first heuristically secure schemes, thé formalization of models and security notions has allowed the emergency of provable security. After some reminds about cryptography and security reduction, we propose new signature and encryption schemes, with some advantages over the existing Systems. Indeed, we propose two new signature schemes with a security proof in the random oracle model, and expose a new signature scheme which features a provable security in the standard model. All of these schemes feature both tight security and the possible use of coupons. Next, we describe a new encryption scheme, based on a new cryptographical problem. We also give another look to the universel paddings, and show how to obtain tight security for identity-based encryption schemes. In the last part of this thesis, we deal with the physical security of cryptographical software. We propose notably new efficient countermeasures against simple side-channel attacks (SPA) and differentiel side-channel attacks (DPA)
Bascou, Jean-Jacques. "Contribution à la sécurité des systèmes : une méthodologie d'authentification adaptative." Toulouse 3, 1996. http://www.theses.fr/1996TOU30253.
Full textGagnerot, Georges. "Etude des attaques et des contre-mesures associées sur composants embarqués." Limoges, 2013. http://aurore.unilim.fr/theses/nxfile/default/feffb1ab-ad89-4586-a86c-efb78fb12b3c/blobholder:0/2013LIMO4057.pdf.
Full textEmbedded cryptographic systems are more and more used nowadays, starting from our credit card, to our SIM that identifies us on the GSM networks, or to our smartphones for example that store personal or secret data. Those systems have to be resistant against different kind of attacks, physical and logical. Our work that we present thereafter first introduce cryptography with the different classic algorithms used. We proceed to present the state of the art on side channel attacks, those attacks are very dangerous since they do not always need the physical possession of the target device, and can be done remotely with the good material. They are based on the study of the emissions produced by a component while it is using the secret stored in its internal memory to retrieve the secret through statistic computations or simple observations like the time it takes to treat data. We then propose a survey on faults attacks that also threaten security product. The idea is to produce a non standard behavior by changing its environment, like sending photons or power discharge and then trying to recover the secrets. In a second part, we propose new attacks, associated counter-measures and new algorithm to secure computation while making them also quicker. We present after a simulator of side channel emissions and faults attacks that allows us to assess the security of embedded systems quicker and cheaper than standard methods
Contes, Arnaud. "Une architecture de sécurité hiérarchique, adaptable et dynamique pour la Grille." Nice, 2005. http://www.theses.fr/2005NICE4025.
Full textWhereas security is a key notion in the world of distributed applications, its numerous concepts are a difficult step to overcome when constructing such applications. Current middlewares provide all major security-related technologies. However developers still have to select the more accurate one and handle all its underlying processes which is particularly difficult with dynamic, grid-enabled applications. To facilitate the use of security concepts in such applications, tis thesis presents a decentralised security model which takes care of security requirements expressed by all actors (resource provides, administrators, users) involved in a computation. The model is implemented outside the application source code. Its configuration is read from external policy files allowing the adaptation of the application’s security according to its deployments. It has been conceived to handle specific behaviors which could happen during a distributed application life-cycle (use of newly discovered resources, remote object creation)
Hourdin, Vincent. "Contexte et sécurité dans les intergiciels d'informatique ambiante." Nice, 2010. http://www.theses.fr/2010NICE4076.
Full textIn ubiquitous computing, context is key. Computer applications are extending their interactions with the environment: new inputs and outputs are used, such as sensors and other mobile devices interacting with the physical environment. Middlewares, created in distributed computing to hide the complexity of lower layers, are then loaded with new concerns, such as taking into account the context, adaptation of applications or security. A middleware layer representation of these concerns cannot express all heir interdependencies. In pervasive computing, distribution is required to obtain contextual information, but it is also necessary to take into account the context in distribution, for example to restrict interactions between entities in a defined context. In addition,asynchronous interactions used in those new environments require special attention when taking into account the context. Similarly, security is involved both in the middleware layers of distribution and context-sensitivity. In this thesis we present a model taking into account the context both in security and distribution. Access control must evolve to incorporate a dynamic and reactive authorization, based on information related to environment or simply on the authentication information of entities. Contextual information evolve with their own dynamic, independent of applications. It is also necessary to detect context changes to reenforce the authorization. We are experimenting this context-awareness targetting interaction control with the experimental framework WComp, derived from the SLCA/AA (Service Lightweight Component Architecture / Aspects of Assembly) model. SLCA allows to create dynamic middlewares and applications for which functional cutting is not translated into layers but into an interleaving of functionalities. Aspects of assembly are a mechanism for compositional adaptation of assemblies of components. We use them to express our non-functional concerns and to compose them with existing applications in a deterministic and reactive manner. For this purpose, we introduce context-aware interaction control rules. The middleware thus allows to adapt, according to context, our non-functional concerns and the behavior of the application
Mallouli, Wissam. "Une approche formelle pour le test des politiques de sécurité." Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0021.
Full textSecurity is a critical issue especially in dynamic and open distributed environments such as World Wide Web or wireless networks. To ensure that a certain level of security is always maintained, the system behavior must be restrained by a security policy. In this thesis, we propose a framework to specify security policies and test their implementation on networking and information systems. Security policies, nowadays, are a key point for the success of every modern infrastructure. The specification and the testing of security policies are the fundamental steps in the development of a secure system since any error in a set of rules is likely to harm the global security. We rely on two different test approaches to build our framework: the active and the passive approaches. The active testing consists in generating a set of test cases that can be applied on a specific implementation to study its conformance according to its security requirements. Whereas, the passive testing consists in passively observing the traffic of the system under test, without interrupting its normal operations. In the active approach, we propose a framework to automatically generate test sequences to validate the conformance of a security policy. The functional behavior of the system is specified using a formal description technique based on Extended Finite State Machines (EFSM), while the security requirement is specified using two formals languages (Or-BAC and Nomad). We developed specific algorithms to integrate the security rules within the functional system specification. In this way, we obtain a complete specification of the secured system. Then, the automatic test generation is performed using dedicated tools to produce test suites in a standard language (TTCN or MSC) facilitating their portability. In the passive testing approach, we specify, using Nomad formal language, the security policy the system under test has to respect. We analyze then the collected traces of the system execution in order to deduce verdicts of their conformity with respect to the system security requirements. Several algorithms are developed to check whether the collected traces conform or not to the security policy. We applied our framework on diverse systems ranging from wireless networking (OLSR ad hoc routing protocol) to computer systems including audit systems (SAP R/3), web services (France Télécom Travel) and web applications (Weblog Application). This wide range of applications allows to demonstrate the efficiency and the reliability of the proposed approaches
Chevalier, Sébastien. "La sécurité de l'immeuble loué." Toulouse 1, 2005. http://www.theses.fr/2005TOU10015.
Full textThe late but increasing recognition of building security give to the parties involved in a lease a real safety oblogation at its agreement as well as during its execution. The public health and safety policy justifies government interference in building management and seems to be using the lease to ensure building compliance with norms
Humphries, Christopher. "User-centred security event visualisation." Thesis, Rennes 1, 2015. http://www.theses.fr/2015REN1S086/document.
Full textManaging the vast quantities of data generated in the context of information system security becomes more difficult every day. Visualisation tools are a solution to help face this challenge. They represent large quantities of data in a synthetic and often aesthetic way to help understand and manipulate them. In this document, we first present a classification of security visualisation tools according to each of their objectives. These can be one of three: monitoring (following events in real time to identify attacks as early as possible), analysis (the exploration and manipulation a posteriori of a an important quantity of data to discover important events) or reporting (representation a posteriori of known information in a clear and synthetic fashion to help communication and transmission). We then present ELVis, a tool capable of representing security events from various sources coherently. ELVis automatically proposes appropriate representations in function of the type of information (time, IP address, port, data volume, etc.). In addition, ELVis can be extended to accept new sources of data. Lastly, we present CORGI, an successor to ELVIS which allows the simultaneous manipulation of multiple sources of data to correlate them. With the help of CORGI, it is possible to filter security events from a datasource by multiple criteria, which facilitates following events on the currently analysed information systems
Habib, Lionel. "Formalisations et comparaisons de politiques et de systèmes de sécurité." Paris 6, 2011. http://www.theses.fr/2011PA066146.
Full textPuig, Jean-Jacques. "Une approche générique de la sécurité du routage." Evry, Institut national des télécommunications, 2004. http://www.theses.fr/2004TELE0006.
Full textIn datagrams networks, routing protocols provide for the data required for datagrams forwarding, from router to router, up to destination. Yet, routing protocols security is weak and often limited to securing neighbouring routers exchanges. This thesis studies main routing protocols in use in IPv4 networks (RIP, OSPF, IS-IS and BGP). It elaborates models for protocols operations and routing information representation. A risks analysis is then pursued and leads to the definition of security goals. This work is related to the ongoing effort of the author through its contributions in the [RPSec] working group of the IETF. Author investigated for solutions against threats through two directions : prevention and the reactive approach. Both are necessaries in order to provide for a sufficient security level in a routing system and to cover a significant part of security goals. Prevention protects routing information and it's infrastructure. As an instance, some solutions protect destinations description against forbidden alterations. The reactive approach checks and tests routing coherence, detects inconsistencies, finds out necessary actions so that security incidents consequences get limited or the system gets back working properly. As an instance, it is sometimes possible to detect that forwarding state denies routing data. The document follows a security process, from the analysis of the failing systems up to solutions design. A simplified version of this process was the topic of one of the author's articles
Sam-Lefebvre, Awa. "La sécurité du passager dans le transport maritime." Nantes, 2011. http://www.theses.fr/2011NANT4020.
Full textThe concept of risk governs maritime navigation. The maritime transport has significant risks that are both inherent in the environment, the used equipments and staff on board. The risks management is necessary to prevent maritime disasters as the shipwrecks of the Estonia, the Joola, the Al Salam Boccaccio and, recently, the MV Spice Lander Tanzania which they stemmed the security flaws governing the sector. We must protect passengers in ensuring the safety and the security of maritime navigation. The regulation, dispersed by the geographic application of conventions more or less extensive according to their ratification by states, makes the questions more difficult. In this context, revisit the whole issue of passenger safety is paramount importance. Then, It will necessary to review the risk management and the failures of maritime regulation by redefining the responsibilities, whether that of the carrier, first contact of the passenger, the ship builder, classification societies or the pavilion State
Petropoulou, Athanasia. "Liberté et sécurité : les mesures antiterroristes et la Convention Européenne des Droits de l'Homme." Thesis, Paris 1, 2013. http://www.theses.fr/2013PA010274.
Full textThe dialectic relation between liberty and security in the context of the fight against terrorism illustrates the ambivalence and the difficulties of the articulation of these concepts, underlying the classical dilemma in the democratic political regimes: how to defend democracy without destroying its essence. The renewed interest for the subject. finds its origin in the events of September II, sinister witnesses of the extent of the dissemination and privatization of violence, which radicalized the effects and characteristics of terrorist criminality. Confronted with the tremendous force of terrorism, whose definition in law remains imprecise, national governments responded by adopting legislative measures and practices. which defy openly human rights and the Rule of Law. As far as the question of the protection of human rights is concerned. it is the judge. who has the task to limit the arbitrary action of the executive and the "excesses" of the terrorized legislator. The approach of the European Convention of Human Rights and the case-law of the Court of Strasbourg have marked the debate relating to the protection of human rights in the fight against terrorism in Europe and word wide. and has become an essential reference in this field. The study of the case -law permits us to pose the question as to whether the case-law of the Court within the last decade has radically evolved and eventually whether the predominant preventive aspect of antiterrorist policies has had an impact on the control applied by the judges. who must struck a balance between the respect of human rights and security interests in a democratic society. In this regard. the analysis of the "terrorist case-law" is based. firstly. on the protection of rights and liberties closely connected to the Rule of Law and to democratic pluralism. and secondly. on the protection of human life and dignity. two values which are fundamental in democratic societies. In spite of the danger of an attenuated proportionality control and a systematic differentiation of the scope of the protection of the rights and liberties according to the gravity of the terrorist threat the response of the European Court of Human Rights consists in reaffirming the principles of the European Convention and the values inherent to human rights and democratic society
Qin, Hao. "Sécurité pratique de systèmes de cryptographie quantique : étude d'attaques et développement de contre-mesures." Electronic Thesis or Diss., Paris, ENST, 2015. http://www.theses.fr/2015ENST0040.
Full textIn this thesis, I study a cryptographic primitive called quantum key distribution which allows two remote parties to share a secret key, in the presence of an eavesdropper, whose power is only limited by the laws of quantum physics. I focus my study on the implementation and the practical security of continuousvariable protocols. For the first time, I have proposed and studied a detector-based side channel attack on a continuous-variable system : saturation attack. This attack opens a new security loophole that we have characterized experimentally in our laboratory, on a real continuous-variable system. Finally, we have demonstrated experimentally for the first time the feasibility of a continuous-variable system deployment in a Dense Wavelength Division Multiplexing network, where quantum signals coexist with intense classical signals in a same fiber
Duc, Guillaume. "Support matériel, logiciel et cryptographique pour une éxécution sécurisée de processus." Télécom Bretagne, 2007. http://www.theses.fr/2007TELB0041.
Full textThe majority of the solutions to the issue of computer security (algorithms, protocols, secure operating systems, applications) are running on insecure hardware architectures that may be vulnerable to physical (bus spying, modification of the memory content, etc. ) or logical (malicious operating system) attacks. Several secure architectures, which are able to protect the confidentiality and the correct execution of programs against such attacks, have been proposed for several years. After the presentation of some cryptographic bases and a review of the main secure architectures proposed in the litterature, we will present the secure architecture CryptoPage. This architecture guarantees the confidentiality of the code and the data of applications and the correct execution against hardware or software attacks. In addition, it also includes a mechanism to reduce the information leakage on the address bus, while keeping reasonable performances. We will also study how to delegate some security operations of the architecture to an untrusted operating system in order to get more flexibility but without compromising the security of thearchitecture. Finally, some other important mechanism are studied: encrypted processid entification, attestations of the results, management of software signals, management of the threads, inter-process communication
Dien, Jean-Michel. "Contribution à l'étude de la sécurité des procédés chimiques conduisant à des décompositions autocatalysées." Mulhouse, 1995. http://www.theses.fr/1995MULH0407.
Full textVache, Marconato Geraldine. "Evaluation quantitative de la sécurité informatique : approche par les vulnérabilités." Phd thesis, INSA de Toulouse, 2009. http://tel.archives-ouvertes.fr/tel-00462530.
Full textDayyani-Najafabadi, Abdol Rasoul. "La responsabilité du fait de défaut de sécurité des produits." Université Robert Schuman (Strasbourg) (1971-2008), 1996. http://www.theses.fr/1996STR30020.
Full textThis study involes a preliminary part about doctrinal debates concerning the new regime of product liability as well as an analysis about its different material sources. The most important one is the council directive of 25th. July 1985, which study helps to find out its real position within the hierarchy of rules and also to precise its transposition into the different member state's legislation. Afterwards the two main parts exclusively concern the product liability in the french internal law. The fist part relates to define the notion of product liability, which possesses its proper characteristics and must to be distinguished from other similar notions, like regime of responsibility and its juridical obligations. Moreover, this same notion has got its proper scope of law and has to be carefully defined, that is to say the things which can be considered as a product, the person that are victims and responsible, and the damages concerned by the new dispositions. The second part deals with the regime of product responsibility itself. Primary, it depends on specific conditions which constitute the legal system, although the litigants are allowed to organise it through conventional modifications. Secondly, in case of interference of a foreign element during a litigation, its implement involves studying the international competence of law and jurisdiction. The specificity of this regime means that the victim's claim possesses a special jurisdictional treatment for the court. At last, both the producers' risks and the extent of reparation lead to a special study of the collective measure of compensation by of third party
Lefrançois, Amandine. "L'usage de la certification, nouvelle approche de la sécurité dans les transports maritimes." Nantes, 2010. http://www.theses.fr/2010NANT4003.
Full textA context of intense competition in the field of maritime industry show the lack of consideration given by international law to the social and human aspects of maritime transports safety. In an attempt to reach optimal safety, members states of IMO shaped innovative tools, by increasingly borrowing from technical norms and management. The first stage of this process is the use of certification of conformity, and then quality insurance is used in a maritime version leading to safety insurance. States' role has been modified by this new morphology of the law: better defined, flag state's role — undermined by flag of convenience — may find a counterpart in the port state's. More specialised, the necessary controls need specialised agents to carry them out, the responsibility of which must be defined in the event of an accident. Finally, a globalisation phenomenon may be identified in maritime transports safety, leading to the increasingly broad use of managerial concepts, making this specific law catch up lost decades
Boisseau, Alexandre. "Abstractions pour la vérification de propriétés de sécurité de protocoles cryptographiques." Cachan, Ecole normale supérieure, 2003. https://theses.hal.science/tel-01199555.
Full textSince the development of computer networks and electronic communications, it becomes important for the public to use secure electronic communications. Cryptographic considerations are part of the answer to the problem and cryptographic protocols describe how to integrate cryptography in actual communications. However, even if the encryption algorithms are robust, there can still remain some attacks due to logical flaw in protocols and formal verification can be used to avoid such flaws. In this thesis, we use abstraction techniques to formally prove various types of properties : secrecy and authentication properties, fairness properties and anonymity
Dherine, Jean. "Les instruments de mesure de la gestion de production. : Le problème de la sécurité et de la sauvegarde des ressources humaines et non humaines dans trois grands groupes industriels." Metz, 2002. http://docnum.univ-lorraine.fr/public/UPV-M/Theses/2002/Dherine.Jean.LMZ0205.pdf.
Full textThis thesis deals with measurement and the instruments used, through the methods of production management governed by the ISO norms in three large industrial companies : the first of these companies manufactures carbonate and sodium bicarbonate ; the second builds car equipment ; the third develops steel destined to be used cars, household appliances construction works and packaging industries. Starting from the origins and development of measurement, the thesis attemps to establish its hold and incidence on man and machines. A census of the instruments and tools used in production units has led to an observation of the system of constraints inposed on both the operator and his operands. Throughout the interactions between man and machine, we note that measurement does not contradict the juxtaposition of instruments and measuring tools. On the contrary, it encourages the reinforcement of systems which are assured by management techniques intended to increase the safety of man and of machine, and the viability of products. It is by observing measurements and their imposed mechanisms in production units that we manage to reveal their features and their influence on both man and machine
Hachemani, Rabah. "Contribution à la sûreté des automatismes séquentiels : modélisation, identification et test en ligne de la partie opérative." Lille 1, 1987. http://www.theses.fr/1987LIL10018.
Full textPoudel, Minesh. "Aircraft emergency evacuation : analysis, modelling and simulation." Toulouse 2, 2008. http://www.theses.fr/2008TOU20026.
Full textThis thesis is about aircraft emergency evacuation and its principal objective is to establish a computational model able to simulate realistically it. This will contribute to the certification process of new aircraft emergency evacuation layouts and egress procedures for large capacity airliners. This thesis is composed of two main parts. In the first one, the main problem issues are identified, a state of the art in emergency evacuation from aircraft is realized and human behaviours during such an event are described. In the second part of this work, the elements of the emergency evacuation model are identified. After analysing existing models and different models of dynamic cellular systems, the conceptual model of this simulator is proposed. Its framework has been designed using UML and the routines are written in Java. Finally future research directions are given