Dissertations / Theses on the topic 'Protection des données publiques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Protection des données publiques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Teresi, Laurent. "La commercialisation des données publiques." Aix-Marseille 3, 2007. http://www.theses.fr/2007AIX32070.
Full textBenzine, Mehdi. "Combinaison sécurisée des données publiques et sensibles dans les bases de données." Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0024.
Full textProtection of sensitive data is a major issue in the databases field. Many software and hardware solutions have been designed to protect data when stored and during query processing. Moreover, it is also necessary to provide a secure manner to combine sensitive data with public data. To achieve this goal, we designed a new storage and processing architecture. Our solution combines a main server that stores public data and a secure server dedicated to the storage and processing of sensitive data. The secure server is a hardware token which is basically a combination of (i) a secured microcontroller and (ii) a large external NAND Flash memory. The queries which combine public and sensitive data are split in two sub queries, the first one deals with the public data, the second one deals with the sensitive data. Each sub query is processed on the server storing the corresponding data. Finally, the data obtained by the computation of the sub query on public data is sent to the secure server to be mixed with the result of the computation on sensitive data. For security reasons, the final result is built on the secure server. This architecture resolves the security problems, because all the computations dealing with sensitive data are done by the secure server, but brings performance problems (few RAM, asymmetric cost of read/write operations. . . ). These problems will be solved by different strategies of query optimization
Kaplangil, Diren. "Les enjeux juridiques de l'Open Data : Les données publiques entre la patrimonialisation et dé-patrimonialisation." Thesis, Université Grenoble Alpes, 2022. http://www.theses.fr/2022GRALD001.
Full textThe Legal Issues of Open Data: Public data between patrimonialisation and de-patrimonialisationSince the first commitment of the French Government in its open data policy, for a decade now, the issue of free circulation of public sector information takes a new dimension. Considered as « open » in the sense of « free of any restrictive rights », public data do not serve only the democratic goal of consolidating the rights of citizens in their relations with the public authorities, but rather provide an essential « information infrastructure » which constitutes the basis of today's emerging "digital" economy. However, this transformation in apprehension of public data inevitably raises the question of their legal status, which is still far from being clarified. Whereas some adjustments brought under the regime of open data make them legally closer to the legal status of « commons », some other monopolistic practices coming from the public institutions (in particular cultural establishments or their concessionaires) in exploiting the content of their information reveal another approach which is quite close to the form of exclusive property rights.Moreover, opening public data does not only raise the question of the legal nature of these information. Indeed, these information are at the heart of the French State's public policy relating to its intangible assets seeking to protect and exploit them in a way which sometimes may enter into conflict with the principles of open data. At the crossroads of public and private law, more specifically intellectual property law, our thesis is therefore focused on the analysis of this conflictual relationship emerged around the process of proactive release of public sector data online
Rossi, Julien. "Protection des données personnelles et droit à la vie privée : enquête sur la notion controversée de « donnée à caractère personnel »." Thesis, Compiègne, 2020. http://www.theses.fr/2020COMP2549.
Full textInternet and digital information and communication technologies in general are often portrayedas a threat to privacy. This gives rise to many debates, both in the media and among decisionmakers. The Snowden revelations, in 2013, followed by the adoption in 2016 of the General Data Protection Regulation (GDPR), have moved these discussions under the spotlight of the publicsphere.The research presented in this dissertation was born out of three questions: can we define what“privacy” is? Is there any consensus on its definition? And does this consensus change with theevolution of the technical milieu transforming our ways of communicating, and by doing so, theway in which our privacy can be intruded upon? By defining “privacy” as the object which is protected by normative texts – laws, court decisions,techno-political standards of the Internet – protecting the right to privacy, it becomes possible toconduct an empirical study of how it evolved and how it has been a topic of contention. Data protection law emerged in Europe during the 1970’s. Its aim was to protect a “privacy” that was perceived as under threat by the advent of computers. Currently, the GDPR, or somedocuments adopted by standards-settings organisations like the Internet Engineering Task Force(IETF) or the World Wide Web Consortium (W3C), are written with the intention that they protect this privacy through a set of rules and principles referred to as “data protection”, that apply to “personal data”. The legal definitions of this notion produced by political institutions and those crafted instandards-settings bodies are identical. Furthermore, the study of the genealogy of data protection reveals that computer scientists have played a pivotal role in the invention of the principles that “data protection” still relies on, for instance in the GDPR. The analysis of the controversies that took place in the shaping of these rules shows that the notion of “personal data” written down in the normative texts we analysed essentially reflects the beliefs system of a coalition inspired by liberal utilitarian ideals, valuing individual autonomy and granting importance to the respect of one’s consent. This framing of “privacy” has become the paradigm on the field. Other theories, such as those defining “privacy” as a space bound by collectively defined borders protecting it from the public eye, or those advocating the recognition of private property rights on personal data, have been less successful in shaping policy out comes.The advent and spread of networked computers have not directly determined the evolution of theobject that is protected by the right to privacy. It is, rather, the perceptions a group of actors had of computers, that caused such an evolution. Convinced that their liberal conception of privacy issocially valuable, they managed to craft a new legal category during the 1970’s in Europe: the right to the protection of personal data. The GDPR, adopted in 2016, just like Web standards aiming at enhancing the protection of privacy, rely those same principles that were invented during these early debates. Therefore, it can be said that the emergence of computers has indeed, but indirectly, been a triggering factor in the evolution of “privacy” defined as the object protected by the right to privacy
Faria, Maria Paula Marçal Grilo Lobato de. "Données génétiques informatisées : un nouveau défi à la protection du droit à la confidentialité des données personnelles de santé." Bordeaux 4, 1996. http://www.theses.fr/1996BOR40030.
Full textAfter a description of the dangers posed to human privacy by "new genetics" and informatics, this thesis leads to the conclusion, by means of an analysis of the portuguese juridical framework, in a compared law perspective, of the right to confidentiality, medical secrecy and personal data protection laws, that contemporary law needs a special legal statute to rule the confidentiality of personal health genetic data without which fundamental human rights will be in threat
Harivel, Jean. "Libertés publiques, libertés individuelles, risques et enjeux de la société numérique." Thesis, Paris 1, 2018. http://www.theses.fr/2018PA01D024/document.
Full textThe invasion of digital technology has changed civil and administrative society since the end of the 20th century. Public and individual freedoms have been affected by this information technology. Common law has adapted to defend public liberties. Special legislation has been put in place to protect privacy through the protection of personal data. Mercantile companies collect these data and exchange them. They thus constitute a database containing a mass of information concerning each individual. The government adapts laws to allow surveillance of individuals to fight against terrorism. But technology also allows the dissemination of administrative data to citizens and promotes neutral information. This information paves the way for citizen participation. Since France refuses to introduce the protection of privacy directly into the Constitution, the European courts, ECHR and CJEU, have in recent years effectively protected this private life. This protection is also based on better training of individuals in the face of the dangers of social networks and the Internet, training that remains to be developed
Lechevalier, Fabien. "Les fiducies de données personnelles de santé : étude illustrée des enjeux et bénéfices d’une gestion collective de la propriété des données personnelles de santé." Master's thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/67590.
Full textDevigne, Julien. "Protocoles de re-chiffrement pour le stockage de données." Caen, 2013. http://www.theses.fr/2013CAEN2032.
Full textPrivacy is one of the main issues of our modern day society in which the Internet is omnipotent. In this thesis, we study some technics allowing to realise a privacy-preserving cloud storage. In this way, we focus to protect stored data while allowing their owner to share them with people of his choice. Proxy re-encryption, one of the primitives offered by cryptography, is the solution we decide to consider. First, we give a definition of a proxy re-encryption system unifying all existing conventional models. We also describe usual characteristics that this primitive may present and we provide its security model. Then, we focus more precisely on some specific schemes in order to improve their security. In this meaning, we expose a method which turns a scheme secure against a replayable chosen ciphertext attack into a secure scheme against a chosen ciphertext attack. We study schemes based on the Hash ElGamal encryption too and propose some modifications in order to reach a better security. Finally and in order to obtain the most functional cloud storage, we propose two new models. The first one, that we call combined proxy re-encryption, offers dynamic right access. The second one, that we call selective proxy re-encryption, enables a more fine-grained access right control than the one offered by the conditional proxy re-encryption
Cavalier, Mathilde. "La propriété des données de santé." Thesis, Lyon, 2016. http://www.theses.fr/2016LYSE3071/document.
Full textThe question of the protection and enhancement of health data is subject to a permanent renewal because it appears to be in the middle of some conflicting interests. Legal, health and economic logics confront and express themselves through a particularly heterogenous set of regulations on health data. Property rights here seem able to reconcile these issues that first look contradictory appearance issues. Given the place of this right in our legal system and uniqueness of health data, the study of their reconciliation deserves a study of some magnitude. This is a first step to ensure the compatibility of this law with health data. The answer requires a vision of simplified property only to find that the existing rights of the data is already in the property rights but which, because of the particularity of health data, are largely limited. Secondly, therefore the question of the relevance of the application of "more complete" property rights applies to health data. However, we note that the specificity of health data implies that such a the solution is not the most effective for achieving a fair balance between patients and data collectors. Nevertheless, other solutions are possible
Criqui-Barthalais, Géraldine. "La protection des libertés individuelles sur le réseau internet." Thesis, Paris 2, 2018. http://www.theses.fr/2018PA020076/document.
Full textThis study considers the internet as a new territory where rights guaranteed to each individual in physical space can be promoted; not only free speech and privacy, but also the Habeas Corpus prerogative writ, which protects against unlawful imprisonment, and the right to freedom of movement. Thus, processing by analogy, the dissertation intends to promote two specific digital rights: the freedom to connect to the internet and the freedom to surf on the web. The freedom to connect should be part of a public service which promotes this access through public policies. Moreover, barring someone from using the internet can only be decided by a judge. The freedom to surf should protect the web users against unreasonable restrictions. Thus, measures blocking illegal websites should not come through self-regulation but through a legal framework which defines how administrative authorities are entitled to decide such restrictions. The protection of these two rights entails further obligations. Individuals must access the internet anonymously and they must be aware of how the government monitors their actions on the web. This study tries to outline the content of measures aiming to frame network addressing mechanisms. Identity checks based on the IP address should be subject to a strict legal regime. The study concludes that individuals have to be protected from surveillance when data reveal their choices among websites while they are connected. Internet access providers, but also search engines and browsers, must delete this data. Only special measures taken by a public entity or someone entitled to control the web users may lead to this kind of data retention
Brasselet, Renato. "La circulation de la donnée à caractère personnel relative à la santé : disponibilité de l’information et protection des droits de la personne." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0333/document.
Full textHealth, m-health and self quantification connect the body and disrupt the traditional model of care. They are moving it from curative and monopoly medicine to preventive medicine and taking a WHO-defined approach to health. By this means, the person is no longer simply placed at the center of the care device he becomes one of the actors including in the intimacy of his privacy.On the other hand, in search of the realization of economy but also of quality, the health system, has mutated, under the effect of the deployment of e-health. As a result, it is now substantially landscaped and can no longer be synthesized into the classic dichotomy between health and social medicine. The vector and resultant of this phenomenon consists in the circulation of health information. From now on, it has become largely digital and essential for the care and functioning of the healthcare system. The care is now conceived around categorical and inter-categorical exchange and sharing, even man-machine or machine-machine and no longer on a medicine based on secrecy. The Man who has become a homo Numericus is not without all rights and privacy. Law and techno-law are part of this scholarly game, the slightest inconsistent reform of which could upset its precarious balance
Ladjel, Riad. "Secure distributed computations for the personal cloud." Electronic Thesis or Diss., université Paris-Saclay, 2020. http://www.theses.fr/2020UPASG043.
Full textThanks to smart disclosure initiatives and new regulations like GDPR, individuals are able to get the control back on their data and store them locally in a decentralized way. In parallel, personal data management system (PDMS) solutions, also called personal clouds, are flourishing. Their goal is to empower users to leverage their personal data for their own good. This decentralized way of managing personal data provides a de facto protection against massive attacks on central servers and opens new opportunities by allowing users to cross their data gathered from different sources. On the other side, this approach prevents the crossing of data from multiple users to perform distributed computations. The goal of this thesis is to design a generic and scalable secure decentralized computing framework which allows the crossing of personal data of multiple users while answering the following two questions raised by this approach. How to preserve individuals' trust on their PDMS when performing global computations crossing data from multiple individuals? And how to guarantee the integrity of the final result when it has been computed by a myriad of collaborative but independent PDMSs?
Delivré, Cendrine. "Finances publiques et protection du patrimoine culturel." Lyon 3, 2004. http://www.theses.fr/2004LYO33043.
Full textThis thesis intends to study the relations between public finance, understood widely as tax rules and financing, and protection of cultural heritage defined as the group of goods proving cultural interest and revealing social worthy to inheritance purpose. Protection of cultural heritage takes place in the French law by means of numerous juridical instruments, more particularly financial and fiscal ones. The diversification of financial and fiscal instruments related to the protection of cultural heritage has been improving since the end of the old regime. These variegate tools need a well-ordered description. Afterwards, an analysis of the public finance action in favour of the protection of cultural heritage was undertaken in order to elucidate the recent objective-oriented financial and fiscal mechanisms
Dang, Thi Thu Thao. "La protection des données personnelles." Paris 2, 2009. http://www.theses.fr/2009PA020010.
Full textHoang, Van-Hoan. "Securing data access and exchanges in a heterogeneous ecosystem : An adaptive and context-sensitive approach." Thesis, La Rochelle, 2022. http://www.theses.fr/2022LAROS009.
Full textCloud-based data storage and sharing services have been proven successful since the last decades. The underlying model helps users not to expensively spend on hardware to store data while still being able to access and share data anywhere and whenever they desire. In this context, security is vital to protecting users and their resources. Regarding users, they need to be securely authenticated to prove their eligibility to access resources. As for user privacy, showing credentials enables the service provider to detect sharing-related people or build a profile for each. Regarding outsourced data, due to complexity in deploying an effective key management in such services, data is often not encrypted by users but service providers. This enables them to read users’ data. In this thesis, we make a set of contributions which address these issues. First, we design a password-based authenticated key exchange protocol to establish a secure channel between users and service providers over insecure environment. Second, we construct a privacy-enhancing decentralized public key infrastructure which allows building secure authentication protocols while preserving user privacy. Third, we design two revocable ciphertext-policy attribute-based encryption schemes. These provide effective key management systems to help a data owner to encrypt data before outsourcing it while still retaining the capacity to securely share it with others. Fourth, we build a decentralized data sharing platform by leveraging the blockchain technology and the IPFS network. The platform aims at providing high data availability, data confidentiality, secure access control, and user privacy
Munoz, Martine. "La protection des échanges de données informatisées." Nice, 1997. http://www.theses.fr/1997NICE0045.
Full textMorvan, Régis. "Les politiques publiques locales de protection de l'environnement : éléments d'analyse des systèmes comptables des administrations publiques locales." Montpellier 1, 2003. http://www.theses.fr/2003MON10050.
Full textCutillo, Leucio Antonio. "Protection des données privées dans les réseaux sociaux." Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00932360.
Full textCoudray, Ludovic. "La protection des données personnelles dans l'Union européenne." Paris 2, 2005. http://www.theses.fr/2005PA020094.
Full textGaudreau, Guy, Claire-Andrée Fortin, and Robert Décarie. "Les récoltes des forêts publiques (1850-1945) Proposition de correction des données." Institut d'histoire de l'Amérique française, 1993. https://zone.biblio.laurentian.ca/dspace/handle/10219/251.
Full textWagener, Noé. "Les prestations publiques en faveur de la protection du patrimoine culturel." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA111007.
Full textThe thesis has made the methodological choice of reducing the action of the State for the protection of cultural heritage to a simple series of "services". Taking the neoliberal perspective literally, it intends to study all State interventions in this area, regardless of the shapes they assume (enactment of regulation and provision of services). In doing so, the scientific challenge of the thesis is to get to determine why the State acts in cultural heritage, and more specifically why it acts in a certain way rather than another. This functional interrogation, rarely asked by lawyers in France, is of interest as it questions the particular ways in which specific categories of law help to produce - much more than to describe - the choice of a particular cultural heritage protection. Thus, the diachronic observation of services, since the French Revolution, shows that on multiple occasions, these services have found, in all seriousness, their source outside the State, specifically in a community right. Also, beyond a progressive etatization process (which is not in itself very original), a complex reversal of the relation of the State to the society emerges : during the nineteenth and twentieth centuries, the State frees itself from the society, helped by a massive work of doctrinal reconceptualizations. It is only between World War I and World War II, after the failure of theories of social law, that the legal explanation of State services for the protection of cultural heritage is finally locked in the antagonism between the authority of the State and fundamental rights
Jacob, Stéphane. "Protection cryptographique des bases de données : conception et cryptanalyse." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2012. http://tel.archives-ouvertes.fr/tel-00738272.
Full textLefèvre, Pascal. "Protection des contenus multimédias pour la certification des données." Thesis, Poitiers, 2018. http://www.theses.fr/2018POIT2273/document.
Full textFor more than twenty years, technology has become more and more easy to access. It is omnipresent in everyday life and is low cost. It allows anyone using a computer or a smartphone to visualize and modify digital contents. Also, with the impressive progress of online massive data storage (cloud), the quantity of digital contents has soared and continues to increase. To ensure the protection of intellectual property and copyright, knowing if an image has been modified or not is an important information in order to authenticate it. One approach to protect digital contents is digital watermarking. It consists in modifying an image to embed an invisible mark which can authenticate the image. In this doctorate thesis, we first study how to improve the robustness of digital image watermarking against image processings thanks to error correcting codes. By studying the error structure produced by the image processing applied on a watermarked image, we can find an optimal choice of error correcting code for the best correction performances. Also, we propose to integrate a new type of error correcting codes called rank metric codes for watermarking applications. Then, we propose to improve the invisibility of color image watermarking methods. At the embedding step, a host image suffers some distortions which are perceived differently in function of the color by the human visual system. We propose a biological model of color perception which allows one to minimize psychovisual distortions applied on the image to protect
Grenet, Ingrid. "De l’utilisation des données publiques pour la prédiction de la toxicité des produits chimiques." Thesis, Université Côte d'Azur (ComUE), 2019. http://www.theses.fr/2019AZUR4050.
Full textCurrently, chemical safety assessment mostly relies on results obtained in in vivo studies performed in laboratory animals. However, these studies are costly in term of time, money and animals used and therefore not adapted for the evaluation of thousands of compounds. In order to rapidly screen compounds for their potential toxicity and prioritize them for further testing, alternative solutions are envisioned such as in vitro assays and computational predictive models. The objective of this thesis is to evaluate how the public data from ToxCast and ToxRefDB can allow the construction of this type of models in order to predict in vivo effects induced by compounds, only based on their chemical structure. To do so, after data pre-processing, we first focus on the prediction of in vitro bioactivity from chemical structure and then on the prediction of in vivo effects from in vitro bioactivity data. For the in vitro bioactivity prediction, we build and test various models based on compounds’ chemical structure descriptors. Since learning data are highly imbalanced in favor of non-toxic compounds, we test a data augmentation technique and show that it improves models’ performances. We also perform a largescale study to predict hundreds of in vitro assays from ToxCast and show that the stacked generalization ensemble method leads to reliable models when used on their applicability domain. For the in vivo effects prediction, we evaluate the link between results from in vitro assays targeting pathways known to induce endocrine effects and in vivo effects observed in endocrine organs during longterm studies. We highlight that, unexpectedly, these assays are not predictive of the in vivo effects, which raises the crucial question of the relevance of in vitro assays. We thus hypothesize that the selection of assays able to predict in vivo effects should be based on complementary information such as, in particular, mechanistic data
Dari, Bekara Kheira. "Protection des données personnelles côté utilisateur dans le e-commerce." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00923175.
Full textHadmi, Azhar. "Protection des données visuelles : analyse des fonctions de hachage perceptuel." Thesis, Montpellier 2, 2012. http://www.theses.fr/2012MON20159/document.
Full textThe widespread use of multimedia technology has made it relatively easy to manipulate and tamper visual data. In particular, digital image processing and image manipulation tools offer facilities to intentionally alter image content without leaving perceptual traces. This presents a serious problem, particularly if the authenticity of the digital image is required. The image authentication should be based on their visual content and not on their binary content. Therefore, to authenticate an image, some acceptable manipulations that could undergoes an image, such as JPEG compression and Gaussian noise addition, must tolerated. Indeed, these manipulations preserve the visual appearance of the image. At the same time a perceptual hashing system should be sufficiently sensitive to detect malicious manipulations that modify the interpretation of the semantic content of the imagesuch as adding new objects, deleting or major modification of existing objects.In this thesis, we focus on perceptual hash functions for authentication and integrityverification of digital images. For this purpose, we present all aspects of perceptual hashfunctions. Then, we discuss the constraints that perceptual hashing system must satisfy tomeet desired level of robustness of perceptual signatures. Finally, we present a method toimprove the robustness and security of a system of perceptual hashing
Boul, Maxime. "Le patrimoine immatériel des personnes publiques." Thesis, Toulouse 1, 2017. http://www.theses.fr/2017TOU10016.
Full textThe public intangibles deeply shift the public property law. The report « The economy of the intangible: tomorrow’s growth » published in 2006 started an awareness of intangibles in the public heritages resulting on the establishment in 2007 of the Agency for Public Intangibles ofFrance (APIE), a government agency with national authority attached to Treasury Directorate General and Public Finances Directorate General. The rising interest for intangibles manifests a political will to value because they are an underutilized wealth. These assets are complexly identified in law because “intangible asset” is an accounting concept. Moreover, Intangibles law is built in the margin of the general Code on public property adopted in 2006, which is mute on its applicability to these intangible goods. Intangibles’ inclusion in the public estates consequently raises the issue of their incorporation in the public domain. The hypothesis of an intangible public domain means that the characteristics of condition and legal structures of these goods has to be studied, as well as its compatibility with economic valuation’s imperatives among other public utilities
De, Almeida da Dutra Pedro Paulo. "Réflexions sur le contrôle des entreprises publiques, à partir des données du droit brésilien : une proposition de changement." Paris 2, 1988. http://www.theses.fr/1988PA020126.
Full textA new point of view of the notion of control results by assining new weights to the elements which integrate the notion. A control operation is composed by a model, some parameters and a verification action. If one of these elements is missing, the operation is not carried out. This idea lead our study, we propose that public corporations in brasil can apply the suggested control operation
Tsiklitiras, Stavros. "La protection effective des libertés publiques par le juge judiciaire en droit français." Paris 2, 1988. http://www.theses.fr/1988PA020022.
Full textTsiklitiras, Stavros. "La Protection effective des libertés publiques par le juge judiciaire en droit français." Lille 3 : ANRT, 1988. http://catalogue.bnf.fr/ark:/12148/cb37618992g.
Full textSavin-Le, Roy Carole. "La gestion des propriétés publiques naturelles du littoral." Brest, 2001. http://www.theses.fr/2001BRES5002.
Full textLaunched at first on the Mediterranean coast, the policy of acquisition of the most fragile spaces of the coast took its scale with creation of the "Conservatoire de l'espace littoral et des rivages lacustres" and the development of a right of preemption in the sensitive natural spaces. The public appropriation became, so, an essential modality of a policy of conservation of the seaside. The management of these spaces, which is the foundation of their acquisition, imposes however the definition to an adapted legal status. In the debate between public appropriation and servitude, the existence of a positive action of management is indeed, a decisive argument in favour of the public appropriation of the natural spaces. Agreed as all the means insuring the conservation and the renewal of sites, the management of the natural public properties of the coast also integrates, as possible, the organization of the opening of sites. These concerns and their conciliation find an answer adapted within the framework of the "domanialité publique". It is advisable however, in the absence of legislative precision on this question, to clarify the modalities of an annexation of spaces concerned in the "domaine public" as well as the applicable state-owned regime
Hindy, Rana. "Genre, offre de travail et évaluation des politiques publiques : évidences à partir des données égyptiennes." Paris 1, 2010. http://www.theses.fr/2010PA010038.
Full textBlanchet, Pierre-Adrien. "La valorisation du patrimoine immatériel des personnes publiques." Thesis, Paris 2, 2018. http://www.theses.fr/2018PA020087.
Full textOver the past decade, public entities have become aware of the economic potential of their "intangible assets". Upon analysis, such assets are highly diversified and include both irrelevant and relevant items, which can be described as "intangible public properties". It is critical for public entities to achieve a balance between different constraints when promoting their "intangible assets". They must be able to generate new financial resources from such assets by exploiting them while ensuring its adequate protection. Irrelevant elements usually included in the "intangible assets" are often subject to autonomous legal regimes which, taken altogether, allow public entities to contemplate a balanced valuation. As for intangible public properties, the analysis will focus on the challenges faced while incorporating them into the domain regime - whether public or private - and then on the available options to implement a legal regime capable of ensuring an optimal valuation
Marliac-Négrier, Claire. "La protection des données nominatives informatiques en matière de recherche médicale." Clermont-Ferrand 1, 1999. http://www.theses.fr/1999CLF10211.
Full textThe protection of named personal information, direct or indirect, was the object of a passionate debate in France during the 70’s, as information technology advanced, and in so doing exposed devious and aberrant practices. This led to the adoption of the law 6th January 1978 called “Informatique et libertés”. If information technology has allowed uncontestable progress in the treatment and stockage of personal information. The health services, in particular have invested heavily in this technology, especially in research and development, and here the information is particularly sensitive. What are the protections and are they sufficient? There is the problem. The law of 1978 was amended by the law 1st July 1994 so as so legally allow the communication of specific medical information, normally covered by the medical secret, to researchers. It appears that the legislation is insufficient and that this will become even more apparent with the application of the European directive n° 95/46 relative to the protection of the individual with regards to personal information and its free circulation. We propose the solutions reconciling the necessity of medical research and the protection of the individual, by valorizing an active role for the individual concerned
Riaud, Stéphanie. "Obfuscation de données pour la protection de programmes contre l'analyse dynamique." Thesis, Rennes 1, 2015. http://www.theses.fr/2015REN1S167.
Full textReverse engineering is a technique that consists in analyzing a product in order to extract a secret. When a computer program is targeted, the reverse engineer may seek to extract an algorithm code or any component of this program. Obfuscation is a protection technique aimed to make it more difficult to reverse engineer. We are interested in the study and development of obfuscation techniques to protect computer programs. We have developed a new technique of code obfuscation, then we have demonstrated its effectiveness, and finally we implemented another protection technique with the aim of enhance the resilience of anti-reverse engineering protection techniques. So we, initially, designed and implemented a new obfuscation technique to protect certain specific elements contained in the programs implemented in C language. By relying on dynamic analysis techniques, we have established the effectiveness of this protection technique. Secondly, we have backed up previously established elements, by demonstrating empirically that this protection can be applied to concrete programs. We demonstrate that this protection can be placed on high-level codes and remain effective on executable files obtained from these codes. We demonstrate that when the process of obfuscation is realized in a scrupulous way, the execution time of programs remains in the same order as that of the protected programs. Thirdly, we work on developing targeted protection mechanisms to counter automatic analysis tools used by reverse engineers. Their aim is to enhance the robustness of the techniques applied to high level by increasing their stealth and providing fake results for the reverse engineers. Our contributions cover various topics related to protection against reverse engineering. We have developed and implemented new code protection techniques. When these protection techniques are apply to high level, we have developed a process to demonstrate that they do not lose efficiency and their cost in terms of execution time remains acceptable. For the lowest level protection techniques that we have developed, we have demonstrated their effectiveness face of dynamic code analysis tools used in reverse engineering
Sokhna, Ndeye Penda. "Impacts économiques de l'immigration en France : finances publiques et consommation." Thesis, Paris 10, 2017. http://www.theses.fr/2017PA100161/document.
Full textThe issue of immigration, in host economies, is today at the center of political, economic and social concerns. Immigration is perceived as a problem rather than an opportunity for host countries in general and France in particular. The results of the Transatlantic Trends survey between 2008 and 2013 show that in France, public opinion on immigration has deteriorated significantly. Do you perceive immigration as a problem rather than an opportunity? 50% of French respondents answered yes in 2013. This percentage was only 39% in 2008. At the same time, demographic projections show a population ageing and immigration could be a solution to this problem. The thesis aims to analyze, in this context of population ageing, the economic effects of immigration by focusing on its impact on public finances and consumption in France. It contributes to the literature on costs and benefits of immigration in the host countries. It helps to shed light on the economic consequences of a political decision on immigration, by testing the effects of changes in migration policies on public finances or the effects of rising income on the consumption of native and immigrant households in France. The thesis focuses on two main parts: the first focuses on the fiscal impact of immigration, with a first chapter on accounting evaluation and a second chapter on dynamic evaluation using a general equilibrium model. The second part of the thesis focuses on the consumption of immigrants in France. Again, there are two chapters: the first measures the contribution of immigrants to final demand and the second analyzes the consumption behavior of native and immigrant households in France
Vinant, Aurore. "Droit et politiques publiques de la danse." Thesis, Bordeaux, 2015. http://www.theses.fr/2015BORD0146/document.
Full textWhereas dancing is part art and sport, it’s assimilated to two types of art, music and theatre, by the law and the public policies. If they share similarities and issues, dancing presents its own specificities and the professionals have to face difficulties that can’t be resolved, because of lack of proper status. Public politicies are beyond the law on these issues. Indeed, dancing has alaready many supports from the politics whose interest for this practice grows : proper aids, support to theaters and auditoriums to represent dancing’s shows, devloppement of a choregraphic’s culture, etc. On one hand, the law, for the moment, only deals with the teaching and the training of the professionnals. On the other hand, choregraphs’s and dancer’s copyrights are still the same as all the others authors or artits, whereas modern choregraphic creation doesn’t still separate the two functions. The same goes to social protection of choregraphic artists which exists, but it’s not adaptated to the physical dimension of the dancing’s jobs. To the opposite, dancing seems to deny work’s laws. Indeed, we can notice a lot of precariousness and hidden work in this sector. So, it’s time for law and public policies to interest more to dancing and conversely
Akue, Adovi Segbeaya. "Finances publiques et politiques de protection de l'environnement dans les pays d'Afrique de l'ouest." Poitiers, 2003. http://www.theses.fr/2003POIT3020.
Full textSainct, Benoît. "Contributions statistiques à l'analyse de mégadonnées publiques." Thesis, Toulouse 3, 2018. http://www.theses.fr/2018TOU30053.
Full textThe aim of this thesis is to provide a set of methodological tools to answer two problems: the prediction of the payroll of local authorities, and the analysis of their tax data. For the first, the work revolves around two statistical themes: the selection of time series model, and the analysis of functional data. Because of the complexity of the data and the heavy computation time constraints, a clustering approach has been favored. In particular, we used Functional Principal Component Analysis and a model of Gaussian mixtures to achieve unsupervised classification. These methods have been applied in two prototypes of tools that represent one of the achievements of this thesis. For the second problem, the work was done in three stages: first, innovative methods for classifying an ordinal target variable were compared on public data, notably by exploiting random forests, SVM and gradient boosting. Then, these methods were adapted to outlier detection in a targeted, ordinal, unsupervised and non-parametric context, and their efficiency was mainly compared on synthetic datasets. It is our ordinal random forest by class separation that seems to have the best result. Finally, this method has been applied to real data of tax bases, where the concerns of size and complexity are more important. Aimed at local authorities directorates, this new approach to examining their database is the second outcome of this work
Pioli, David. "Le petit enfant dans les politiques publiques : enjeu de la régulation sociale." Paris 5, 2003. http://www.theses.fr/2003PA05H036.
Full textAt the beginning of the nineteen seventies the polities of early childhood become the basis of a state project to modernise the relationship between users and the public services. The idea of "human capital" which had dominated the treatment of infants since the end of the nineteenth century progressively gives way to the idea of a "humanity capital", and at the beginning of the 80's infancy policies pave the way for a political project which is democratic and idealistic, dominated by a logic of emancipation and promoted by reference to childhood values. In this way there is an acceleration in focus on the child, since the child itself is the natural repository of these values. However, in so accelerating, the contradictions of this process also become more pronounced. The risk that this emancipatory project will be bad for certain categories of individuals and in particular the weakest then leads the authorities to develop compensatory protection ; this accounts for the parallel socialisation of the family policy and also for the revival of child safeguard policies and growing reference to an ethic of the rights of man. The present regime of plural regulation thus tends to include a search for a transcendence which is in keeping with dialogue and consensus -in agreement with the very foundations of the aforementioned regime- and it manifests itself by promotion of a "logic of institution" and by recourse to ethics and right. It thus appears that "social reflexivity", propelled by the controversies surrounding infancy, is a driving element for the transformation of social regulation regimes, and that the public administration of this age category appears to be a constituent part of the mechanics of social change
Seitz, Ludwig. "Conception et mise en oeuvre de mécanismes sécurisés d'échange de données confidentielles : application à la gestion de données biomédicales dans le cadre d'architectures de grilles de calcul / données." Lyon, INSA, 2005. http://theses.insa-lyon.fr/publication/2005ISAL0055/these.pdf.
Full textGrid computing allows users to share multiple heterogeneous resources, such as computing power, storage capacity and data, and provides an architecture for transparent interoperation of these resources from the user's point of view. An upcoming application for Grids is health-care. More than for the first applications of Grids (e. G. Particle physics, terrestrial observation), security is a major issue for medical applications. Conventional data protection mechanisms are only of limited use, due to the novel security challenges posed by Grids. To respond to these challenges we propose an access control system that is decentralized and where the owners of some data are in control of the permissions concerning their data. Furthermore data may be needed at very short notice, the access control system must support a delegation of rights that is effective immediately. Grid users also need delegation mechanisms to give rights to processes, that act on their behalf. As these processes may spawn sub processes, multi-step delegation must be possible. In addition to these usability requirements, the transparent storage and replication mechanisms of Grids make it necessary to implement additional protection mechanisms for confidential data. Access control can be circumvented by attackers having access to the physical storage medium. We therefore need encrypted storage mechanisms to enhance the protection of data stored on a Grid. In this thesis we propose a comprehensive architecture for the protection of confidential data on Grids. This architecture includes an access control system and an encrypted storage scheme
Lafont, Sylvain Arthur. "La soumission des personnes publiques au droit de la consommation." Montpellier 1, 2007. http://www.theses.fr/2007MON10056.
Full textJarma, Yesid. "Protection de ressources dans des centres de données d'entreprise : architectures et protocoles." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2012. http://tel.archives-ouvertes.fr/tel-00666232.
Full textBouslimi, Dalel. "Protection de données d'imagerie par tatouage et chiffrement - Application à la télémédecine." Télécom Bretagne, 2013. http://www.telecom-bretagne.eu/publications/publication.php?idpublication=11987.
Full textThe rapid evolution of multimedia and communication technologies offers new means of sharing and remote access to patient data (e. G. Telemedicine applications). At the same time, security issues are increased, but not only. Indeed, in telemedicine application frameworks, there is a need to ensure the confidentiality and the reliability (integrity and authenticity) of exchanged images, but also to provide evidence that an exchange took place, particularly in case of litigation. This Ph. D. Thesis focuses on these issues. Our first contribution relates to a new telemedicine protocol based on watermarking and cryptographic mechanisms, which allows bringing out those evidences and identifying which data were exchanged. Our protocol is resistant to different types of attacks (e. G. Non-repudiation issue, collusion attack). This protocol is quite general and can be used with different encryption and watermarking algorithms. Nevertheless, the question arises as to which combination offers the best flexibility/efficiency in terms of security objectives. The answer to this question constitutes the second research axis of this Ph. D. Thesis work. So, on a more practical level, it started by focusing on Joint Watermarking/Encryption (JWE) methods, and has recently culminated in an approach of data hiding of encrypted images (DHE). In both cases, our objective is to ensure an a priori (by encryption) and a posteriori (by watermarking) protection of images; a protection that is appropriate to the previously developed protocol. With those solutions, the embedded pieces of information, a set of security attributes, are available in both the encrypted domain and the spatial domain, i. E. After decryption process. These attributes can be used for verifying the image reliability even though it is encrypted. The two solutions JWE and DHE introduce very low image degradation while providing an enough capacity to embed a reliability proof as well as some other data. The first solution has also been developed to be compliant with the DICOM standard due to the fact that it merges the AES encryption algorithm with the watermarking Quantization Index Modulation (QIM). Our second technique allows us to save computational time because it is not necessary to decrypt the image for watermarking it, and to ensure confidentiality protection without discontinuity
Lanna, Maximilien. "La protection des données à caractère personnel à l’épreuve de l’automesure connectée." Thesis, Paris 2, 2019. http://www.theses.fr/2019PA020026.
Full textPersonal data protection law is today at a turning point : its core principles are weakened by self-tracking technologies, thus reducing protection of individuals. In order to determine how new technologies affect the law, this study aims to figure ou the paradigm shift that has been implemented by the new RGPD and its consequences on personal data protection
Le, Maux Julien. "La protection des actionnaires minoritaires au sein des sociétés cotées en France." Paris 1, 2003. http://www.theses.fr/2003PA010057.
Full textDupouy, Sabrina. "La prise en compte des données environnementales par le contrat." Thesis, Aix-Marseille, 2016. http://www.theses.fr/2016AIXM1068.
Full textThe notion of environment embraces the “natural and artificial living environment of man” which means “the living space” of the human being. Today the quality of this environment takes on an increasing importance in the legal order. Environmental law, which follows the purposes of environmental protection and protection of the human being, is now investing private law. In particular, contract law seems significantly affected by the level of requirement of environmental quality. In this context, what is the role of a contract in front of growing contemporary concerns regarding environmental quality ? It seems that the environment is comprehended by the contract as an ambivalent element. On the one hand it is indeed a risk against which it is necessary to protect the contracting party and, on the other hand, a value that can be directly protected by the contract. The contract is subsequently without doubt shaped by the parties themselves, as well as by the judge and the legislator to protect the contracting party against environmental risks and to contribute to environmental protection
Piolle, Guillaume. "Agents utilisateurs pour la protection des données personnelles : modélisation logique et outils informatiques." Phd thesis, Université Joseph Fourier (Grenoble), 2009. http://tel.archives-ouvertes.fr/tel-00401295.
Full textles divers moyens informatiques destinés à la protection des données personnelles. Il en ressort un besoin de solutions fondées sur les méthodes d'IA, autorisant à la fois un raisonnement sur les réglementations et l'adaptation du comportement d'un agent à ces réglementations. Dans cette perspective, nous proposons le modèle d'agent PAw (Privacy-Aware) et la logique DLP (Deontic Logic for Privacy), conçue pour traiter des réglementations provenant d'autorités multiples. Le composant de raisonnement normatif de l'agent analyse son contexte hétérogène et fournit une politique cohérente pour le traitement des données personnelles. L'agent PAw contrôle alors automatiquement sa propre utilisation des données en regard de cette politique. Afin d'appliquer cette politique de manière distante, nous étudions les différentes architectures d'applications distribuées orientées vers la protection de la vie privée, notamment celles fondées sur les principes du Trusted Computing. Nous en proposons une complémentaire, illustrant la possibilité d'utiliser différemment cette technologie. L'implémentation de l'agent PAw permet la démonstration de ses principes sur trois scénarios, montrant ainsi l'adaptabilité de l'agent à son contexte normatif et l'influence des réglementations sur le comportement de l'application.
Medjdoub, Saïda. "Modèle de contrôle d'accès pour XML : application à la protection des données personnelles." Phd thesis, Université de Versailles-Saint Quentin en Yvelines, 2005. http://tel.archives-ouvertes.fr/tel-00340647.
Full textLa mise en place de DMP auprès d'un hébergeur de données de santé pose des problèmes de confidentialité. En effet, l'hébergeur peut se révéler non fiable. Pour cette raison, nous avons étudié, également, des solutions pour sécuriser le partage des données sur des infrastructures non sûres.
Malekian, Hajar. "La libre circulation et la protection des données à caractère personnel sur Internet." Thesis, Paris 2, 2017. http://www.theses.fr/2017PA020050.
Full textFree flow of data and personal data protection on the Internet Protection of personal data is an autonomous fundamental right within the European Union (Article 8 of the Charter of Fundamental Rights of European Union). Moreover, free flow of personal data and free movement of information society services in particular online platforms is essential for the development of digital single market in European Union. The balance between free movement of data and personal data protection is subject of the European legal framework. However, the main challenge still remains to strike the right balance between effective personal data protection and free flow of this data and information society services. This balance is not an easy task especially in the age of online platforms, Big Data and processing algorithms like Machine Learning and Deep Learning