Academic literature on the topic 'Respectueux de la vie privée'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Respectueux de la vie privée.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Respectueux de la vie privée"
Christophe, de la Mardière. "Le mythe de l’unicité de l’impôt." Gestion & Finances Publiques, no. 1 (January 2021): 29–34. http://dx.doi.org/10.3166/gfp.2021.1.006.
Full textThériault, Sophie, and David Robitaille. "Les droits environnementaux dans la Charte des droits et libertés de la personne du Québec : Pistes de réflexion." McGill Law Journal 57, no. 2 (February 7, 2012): 211–65. http://dx.doi.org/10.7202/1007816ar.
Full textZeggagh, J., L. Gourmand, P. Duan, F. Dautil, N. Divet, C. Monteil, M. Lafaurie, and L. Luong Nguyen. "« BriserLaChaine.org » : conception d’un outil digital de contact tracing des personnes à risque d’infection au SARS-CoV-2 respectueux de la vie privée." Médecine et Maladies Infectieuses 50, no. 6 (September 2020): S65. http://dx.doi.org/10.1016/j.medmal.2020.06.126.
Full textNagy, Eszter. "A Visiones Georgii kéziratai az altzellai apátság könyvtárában, avagy Krizsafán fia György látomásainak recepciója a cisztercieknél." Magyar Könyvszemle 136, no. 1 (October 24, 2020): 1–22. http://dx.doi.org/10.17167/mksz.2020.1.1-22.
Full textParini, Lorena. "Vie privée et vie publique." Langage et société 105, no. 3 (2003): 69. http://dx.doi.org/10.3917/ls.105.0069.
Full textLebrun, Pierre-Brice. "La vie privée." Empan 100, no. 4 (2015): 168. http://dx.doi.org/10.3917/empa.100.0168.
Full textMeltz, Romain. "Vie professionnelle, vie privée : le brouillage." Sciences Humaines N° 266, no. 1 (January 1, 2015): 19. http://dx.doi.org/10.3917/sh.266.0019.
Full textJennane, Abdelillah. "Vie Privée , Vie Professionnelle : Quelle Conciliation ?" Economia, no. 26 (February 2016): 47–49. http://dx.doi.org/10.12816/0025610.
Full textCassuto, Thomas. "Vie privée, vie publique et cybercriminalité." Sécurité globale 6, no. 4 (2008): 45. http://dx.doi.org/10.3917/secug.006.0045.
Full textMehl, Dominique. "La « vie publique privée »." Hermès N° 13-14, no. 1 (1994): 95. http://dx.doi.org/10.4267/2042/15518.
Full textDissertations / Theses on the topic "Respectueux de la vie privée"
Plateaux, Aude. "Solutions opérationnelles d'une transaction électronique sécurisée et respectueuse de la vie privée." Phd thesis, Université de Caen, 2013. http://tel.archives-ouvertes.fr/tel-01009349.
Full textPlateaux, Aude. "Solutions opérationnelles d’une transaction électronique sécurisée et respectueuse de la vie privée." Caen, 2013. https://tel.archives-ouvertes.fr/tel-01009349.
Full textBy using one's credit card to make a purchase on the Internet or one's mobile phone to connect to social networks, electronic transactions have become part of one's daily routine, in a seemingly inescapable fashion. Unfortunately, these exchanges involve the transfer of a large amount of personal data. Such computerization is not without consequence. The issues of security and privacy protection are truly present. In this thesis, we address the following issue: how to protect one's personal data in computer systems, focusing on three topical subjects. First, we propose a data management system centered on the user. Thus, when the user browses on the Internet, he/she will be guided and have the opportunity to refer to any of the eight features of the application. The second area deals with the managing of the patient's medical records and access control. We propose an e-health architecture in order to ensure the protection of the patient's personal data both within a health establishment and between separate institutions. Finally, we are interested in the field of electronic banking, and more specifically, online payment. We have suggested three new e-payment protocols ensuring the client's privacy. The first two protocols improve existing ones: 3D -Secure, Ashrafi and Ng. The last and completely new architecture allows to pay on the Internet without disclosing any of the user's banking information. With each of these architectures, come security and privacy requirements. The analysis of existing solutions and new propositions are carried out in accordance with these security requirements. Each architecture presented here ensures privacy and comes with a software proof of concept
Ates, Mikaël. "Identités numériques : gestion inter-organisationnelle centrée sur l'utilisateur et respectueuse de la vie privée." Phd thesis, Université Jean Monnet - Saint-Etienne, 2009. http://tel.archives-ouvertes.fr/tel-00443910.
Full textBenkhelif, Tarek. "Publication de données personnelles respectueuse de la vie privée : une démarche fondée sur le co-clustering." Thesis, Nantes, 2018. http://www.theses.fr/2018NANT4070/document.
Full textThere is a strong economic and civic demand for the opening of individual data. However, the publication of such data poses a risk to the individuals represented in it. This thesis focuses on the problem of anonymizing multidimensional data tables containing individual data for publishing purposes. In particular, two data anonymization approaches families will be focused on: the first aims to merge each individual into a group of individuals, the second is based on the addition of disruptive noise to the original data. Two new approaches are developed in the context of group anonymization. They aggregate the data using a co-clustering technique and then use the produced model, to generate synthetic records, in the case of the first solution. While the second proposal seeks to achieve the formalism of k-anonymity. Finally, we present a new anonymization algorithm “DPCocGen” that ensures differential privacy. First, a data-independent partitioning on the domains is used to generate a perturbed multidimensional histogram, a multidimensional co-clustering is then performed on the noisy histogram resulting in a partitioning scheme. Finally, the resulting schema is used to partition the original data in a differentially private way. Synthetic individuals can then be drawn from the partitions
Guittet, Leo. "La transparence des données de santé issues des bases médico-administratives : Pour une ouverture des bases de données respectueuse de la vie privée." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSE3028.
Full textDigitized data is an integral part of our daily lives. Among them, personal health data represent a particularly sensitive group which must be processed and shared with care because they contain information relating to the private lives of individuals. They are therefore subject to special protection as a matter of principle. But at the same time, they are highly coveted because of their potential to improve the entire healthcare system. In France, two major historical databases, SNIIRAM and PMSI, are dedicated to the collection and processing of health data. Although these databases do not contain any personally identifying information, they have long been accessible only under very strict conditions, sometimes difficult to understand, in the name of respect for the privacy of individuals. However, difficult access to these databases represents a proven loss of knowledge, and legal and technical means exist to ensure data security and the right to privacy of individuals. It is for this reason in particular that the procedures for accessing the personal health data contained in these databases have been completely reformed and continue to be reformed. To fully understand the process that led to the recent opening of medico-administrative databases, this study focuses on how access to these data has worked from their creation to the present day. With regard to the types of access that exist, this requires positioning oneself from three angles: that of privileged public actors who benefit from permanent access; that of ordinary public actors and private non-profit actors who can access certain data by complying with a prior authorization regime; and that of private for-profit actors who were first excluded from access to health data before finally being admitted. The evolution of access to this sensitive data is still a headlining topic due to a further reform of the governance of medico-administrative databases and their content. This new project aims to ensure that the protection of the right to privacy is combined with the widest possible access to as much health data as possible
Scholler, Rémy. "Analyse de données de signalisation mobile pour l’étude de la mobilité respectueuse de la vie privée : Application au secteur du transport routier de marchandises." Electronic Thesis or Diss., Bourgogne Franche-Comté, 2024. http://www.theses.fr/2024UBFCD001.
Full textMobile network operators have a significant data source derived from communications of all connected objects (not just smartphones) with the network. These signaling data is a massive source of location data and are regularly used for the mobility analysis. However, potential uses face two major challenges: their low spatiotemporal precision and their highly sensitive nature concerning privacy.In the first phase, the thesis work enhances the understanding of the mobility state (stationary or in motion), speed, direction of movement of connected objects, and the route they take on a transportation infrastructure (e.g., road or rail).In the second phase, we demonstrate how to ensure the confidentiality of continuously produced mobility statistics. The use of signaling data, whether related to users or various connected objects, is legally regulated. For the study of mobility, operators tend to publish anonymized statistics (aggregated data). Specifically, the aim is to calculate complex and anonymized mobility statistics "on the fly" using differential privacy methods and probabilistic data structures (such as Bloom filters).Finally, in the third phase, we illustrate the potential of signaling data and the proposed approaches in this manuscript for quasi-real-time calculation of anonymous statistics on road freight transport. However, this is just an example of what could apply to other subjects analyzing population behaviors and activities with significant public and economic policy implications
Jacques, Thibaut. "Protocoles d’attestation dans les environnements dynamiques." Electronic Thesis or Diss., Limoges, 2024. http://www.theses.fr/2024LIMO0078.
Full textNetwork Functions Virtualisation (NFV) is a networking paradigm where network functions are implemented as software running inside virtualised instances (such as virtual machines or containers) rather than on dedicated hardware. This results in a cloud-like architecture where the virtual network functions (VNFs) are managed on a platform called the Network Function Virtualisation Infrastructure (NFVI). The use of NFVs adds more flexibility to the network. Operators can easily adapt their network by adding, removing, or moving VNFs between servers to scale up or down, or to deploy new services on demand. However, with this flexibility come security challenges. The European Telecommunications Standards Institute (ETSI) recommends the use of remote attestation as one of the tools to secure such an infrastructure. An attestation protocol is a two-party cryptographic protocol in which a prover provides evidence about one or more properties to a verifier. Deep attestation extends the concept of attestation to a virtualized environment, where both the virtual instance and the underlying infrastructure are attested. Although remote attestation, and to a lesser extent deep attestation, are not new techniques, current approaches are not suitable for the NFV environment. In this thesis, we propose three privacy-preserving attestation protocols for the NFV context. We formally prove the security of our proposals. In addition, we demonstrate the effectiveness of our protocols with implementations and experimental results. A first scheme establishes the concept of deep attestation and enhances the current state-of-the-art by providing a solution that strikes a balance between the security and performance of the two predominant existing methods. Based on this building block, we introduce two new schemes that respond to more complex use cases. These schemes take into account the privacy issues that arise in multi-tenant virtualised networks, while being efficient even on large infrastructures and maintaining the security guarantees of the basic building block
Bernes, Bénédicte. "La vie privée du mineur." Toulouse 1, 2006. http://www.theses.fr/2006TOU10035.
Full textThe last decades have seen minors getting even more self sufficient and more individualized within the society, but also within the family context. By the way, the Internatinal Convention on the rights of the Child has settled the basis of a right of the respect of the private life of minors. But, considering its vulnerability, minors cannot benefit from those dispositions. Indeed, subjected to the parental authority, children can benefit from a limited autonomy. Children private life seems to be compound to shrink away. Thus, the incapacity of children is justified by its need of protection related to their own interests. But, the International convention on children rights recommends a stronger power for children in terms of booth protection and autonomy. Since the interest of children is not limited to their protection, but it is extended to their personal blooming, children incapacity can be regarded to be inconsistent. Personally speaking, teenagers do not need parental authority. A sufficient protection could be granted to minors ; outside the parental responsability meanwhile children could use their individual freedom in compliance with their given rights. Thus, advocating the children individual rights seems accurate encompassing their parents. Hence, it would be appropriate to propose the adolescent minor's recognition a right to the respect of its personal life on condition that its own interest is keep safe. He could exercise this right thanks to a special capacity and oppose it even its parents
Ramsewak, Shamila. "La vie privée des fonctionnaires." Paris 13, 2011. http://scbd-sto.univ-paris13.fr/secure/ederasme_th_2011_ramsewak.pdf.
Full textDirrenberger, Géraldine. "Employeur, salarié et vie privée." Thesis, Montpellier 1, 2012. http://www.theses.fr/2012MON10032.
Full textThe border between private and professional life can be confusing. The notion of private life differs from the importance each individual allows it, it follows as well the evolution of the society. Inside the working relationship, distinguished among the subordination connection, which priority should we assign it ? If there is agreement that in the working place a remaining private sphere truly exists, how can we efficiently unite it with the productivity requirements of the working environment ? Despite a strong protection of the employee's private life, the professional sphere stepping into the private one is an additional risk to see this idea to lose its meaning. The goal of our study is to point out the changes that occurred at work especially with the use of new technologies and the difficulties experienced due to the requirements to respect the employee's personal freedom. In this context we are considering some solutions to have those two spheres working together despite the balance requirement that must oversee the working relationship
Books on the topic "Respectueux de la vie privée"
Steiner, Olivier. La vie privée: Roman. [Paris]: Gallimard, 2014.
Find full textfrançaise, France Documentation, ed. Médias et vie privée. Paris: Documentation Française, 2007.
Find full textChassigneux, Cynthia. Vie privée et commerce électronique. Montréal, QC: Éditions Themis, 2004.
Find full textSylvie, Del Cotto, ed. Ma vie privée sur Internet. [Paris]: Marabout, 2009.
Find full textEleb, Monique. Architectures de la vie privée. Bruxelles: Aux Archives d'architecture moderne, 1989.
Find full textPhilippe, Ariès, and Duby Georges, eds. Histoire de la vie privée. Paris: Seuil, 1987.
Find full textPiron, Olivier. L'urbanisme de la vie privée. La Tour d'Aigues: Aube, 2014.
Find full textGraves, Frank. La vie privée exposée: Le sondage canadien sur le respect de la vie privée. Ottawa, Ont: Communications Canada, 1993.
Find full textBurgade, Denis de La. La vie privée des hommes politiques. Villeneuve-d'Ascq: Presses universitaires du septentrion, 2002.
Find full textAnnie, Rieu, ed. Femmes: Engagements publics et vie privée. Paris: Syllepse, 2003.
Find full textBook chapters on the topic "Respectueux de la vie privée"
Deneer, Eveline. "Painting the ‘vie privée of Our Forefathers’." In Representing the Past in the Art of the Long Nineteenth Century, 32–47. New York: Routledge, 2021. http://dx.doi.org/10.4324/9781351004183-2.
Full textZXIVANOVICH, Sava, Branislav TODOROVIC, Jean-Pierre LORRÉ, Darko TRIFUNOVIC, Adrian KOTELBA, Ramin SADRE, and Axel LEGAY. "L’IdO pour une nouvelle ère de réseaux unifiés, de confiance zéro et de protection accrue de la vie privée." In Cybersécurité des maisons intelligentes, 185–213. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch5.
Full textBOUCAUD, Pascale. "Protection de la liberté et de la fragilité de la personne face au robot." In Intelligence(s) artificielle(s) et Vulnérabilité(s) : kaléidoscope, 137–48. Editions des archives contemporaines, 2020. http://dx.doi.org/10.17184/eac.3642.
Full text"Équilibre vie professionnelle-vie privée." In Comment va la vie ?, 133–56. OECD, 2011. http://dx.doi.org/10.1787/9789264121195-8-fr.
Full text"Vie professionnelle et privée." In Les grandes mutations qui transforment l'éducation. OECD, 2022. http://dx.doi.org/10.1787/2072904e-fr.
Full textFillod-Chabaud, Aurélie. "Justice et vie privée." In Au nom du père, 175–204. ENS Éditions, 2022. http://dx.doi.org/10.4000/books.enseditions.40397.
Full text"Vie privée: Quelques aspects." In Histoire de la pharmacie en france et en nouvelle-france au XVIIIe siècle, 213–34. Les Presses de l’Université de Laval, 2009. http://dx.doi.org/10.1515/9782763706221-014.
Full textLeterrier, Sophie-Anne. "Vie privée, vie publique : le cas Béranger." In La Médiatisation de la vie privée xve-xxe siècle, 207–24. Artois Presses Université, 2012. http://dx.doi.org/10.4000/books.apu.1539.
Full textBiland, Émilie. "Dédicace." In Gouverner la vie privée, 5. ENS Éditions, 2019. http://dx.doi.org/10.4000/books.enseditions.13650.
Full textBiland, Émilie. "Note de l’autrice." In Gouverner la vie privée, 7. ENS Éditions, 2019. http://dx.doi.org/10.4000/books.enseditions.13656.
Full textConference papers on the topic "Respectueux de la vie privée"
Bayard, Pierre. "Les personnages ont une vie privée." In Premier symposium de critique policière. Autour de Pierre Bayard. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4838.
Full textNoé, Paul-Gauthier, Andreas Nautsch, Driss Matrouf, Pierre-Michel Bousquet, and Jean-François Bonastre. "Faire le pont entre l’observation et la preuve : Application au respect de la vie privée." In XXXIVe Journées d'Études sur la Parole -- JEP 2022. ISCA: ISCA, 2022. http://dx.doi.org/10.21437/jep.2022-56.
Full textReports on the topic "Respectueux de la vie privée"
Vilain, Vincent. Protéger la vie privée via un réseau adversarial d’attaque de réidentification. Observatoire international sur les impacts sociétaux de l'intelligence artificielle et du numérique, September 2024. http://dx.doi.org/10.61737/tabe1427.
Full textCastets-Renard, Céline, Pierre-Luc Déziel, and Lyse Langlois. Observations sur le document d'orientation sur la protection de la vie privée à l'intention des services de police relativement à la reconnaissance faciale. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, June 2021. http://dx.doi.org/10.61737/axib9435.
Full textBourassa Forcier, Mélanie, Dary-Anne Tourangeau, Gaëlle Feruzi, and Mathieu Kiriakos. Introduction d’un télérobot en résidences privées : Enjeux légaux et organisationnels. CIRANO, April 2022. http://dx.doi.org/10.54932/obpe9357.
Full textDenier, Nicole, Rebecca Deutsch, Yang Hu, and Yue Qian. Réfléchir aux effets de la transformation numérique sur les familles au Canada. L’Institut Vanier de la famille, September 2024. http://dx.doi.org/10.61959/wvfh3683f.
Full textGautrais, Vincent, and Nicolas Aubin. Modèle d'évaluation des facteurs relatifs à la circulation des données: Instrument de protection de la vie privée et des droits et libertés dans le développement et l’usage de l’intelligence artificielle. Observatoire international sur les impacts sociétaux de l'IA et du numérique, March 2022. http://dx.doi.org/10.61737/rrlb1735.
Full textCastets-Renard, Céline, Émilie Guiraud, and Jacinthe Avril-Gagnon. Cadre juridique applicable à l’utilisation de la reconnaissance faciale par les forces de police dans l’espace public au Québec et au Canada Éléments de comparaison avec les États-Unis et l’Europe : sommaire exécutif et recommandations. Observatoire international sur les impacts sociétaux de l'IA et du numérique, September 2020. http://dx.doi.org/10.61737/ebuf7752.
Full textCastets-Renard, Céline, Émilie Guiraud, and Jacinthe Avril-Gagnon. Cadre juridique applicable à l’utilisation de la reconnaissance faciale par les forces de police dans l’espace public au Québec et au Canada Éléments de comparaison avec les États-Unis et l’Europe. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, September 2020. http://dx.doi.org/10.61737/tnps5755.
Full text