Dissertations / Theses on the topic 'Respectueux de la vie privée'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Respectueux de la vie privée.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Plateaux, Aude. "Solutions opérationnelles d'une transaction électronique sécurisée et respectueuse de la vie privée." Phd thesis, Université de Caen, 2013. http://tel.archives-ouvertes.fr/tel-01009349.
Full textPlateaux, Aude. "Solutions opérationnelles d’une transaction électronique sécurisée et respectueuse de la vie privée." Caen, 2013. https://tel.archives-ouvertes.fr/tel-01009349.
Full textBy using one's credit card to make a purchase on the Internet or one's mobile phone to connect to social networks, electronic transactions have become part of one's daily routine, in a seemingly inescapable fashion. Unfortunately, these exchanges involve the transfer of a large amount of personal data. Such computerization is not without consequence. The issues of security and privacy protection are truly present. In this thesis, we address the following issue: how to protect one's personal data in computer systems, focusing on three topical subjects. First, we propose a data management system centered on the user. Thus, when the user browses on the Internet, he/she will be guided and have the opportunity to refer to any of the eight features of the application. The second area deals with the managing of the patient's medical records and access control. We propose an e-health architecture in order to ensure the protection of the patient's personal data both within a health establishment and between separate institutions. Finally, we are interested in the field of electronic banking, and more specifically, online payment. We have suggested three new e-payment protocols ensuring the client's privacy. The first two protocols improve existing ones: 3D -Secure, Ashrafi and Ng. The last and completely new architecture allows to pay on the Internet without disclosing any of the user's banking information. With each of these architectures, come security and privacy requirements. The analysis of existing solutions and new propositions are carried out in accordance with these security requirements. Each architecture presented here ensures privacy and comes with a software proof of concept
Ates, Mikaël. "Identités numériques : gestion inter-organisationnelle centrée sur l'utilisateur et respectueuse de la vie privée." Phd thesis, Université Jean Monnet - Saint-Etienne, 2009. http://tel.archives-ouvertes.fr/tel-00443910.
Full textBenkhelif, Tarek. "Publication de données personnelles respectueuse de la vie privée : une démarche fondée sur le co-clustering." Thesis, Nantes, 2018. http://www.theses.fr/2018NANT4070/document.
Full textThere is a strong economic and civic demand for the opening of individual data. However, the publication of such data poses a risk to the individuals represented in it. This thesis focuses on the problem of anonymizing multidimensional data tables containing individual data for publishing purposes. In particular, two data anonymization approaches families will be focused on: the first aims to merge each individual into a group of individuals, the second is based on the addition of disruptive noise to the original data. Two new approaches are developed in the context of group anonymization. They aggregate the data using a co-clustering technique and then use the produced model, to generate synthetic records, in the case of the first solution. While the second proposal seeks to achieve the formalism of k-anonymity. Finally, we present a new anonymization algorithm “DPCocGen” that ensures differential privacy. First, a data-independent partitioning on the domains is used to generate a perturbed multidimensional histogram, a multidimensional co-clustering is then performed on the noisy histogram resulting in a partitioning scheme. Finally, the resulting schema is used to partition the original data in a differentially private way. Synthetic individuals can then be drawn from the partitions
Guittet, Leo. "La transparence des données de santé issues des bases médico-administratives : Pour une ouverture des bases de données respectueuse de la vie privée." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSE3028.
Full textDigitized data is an integral part of our daily lives. Among them, personal health data represent a particularly sensitive group which must be processed and shared with care because they contain information relating to the private lives of individuals. They are therefore subject to special protection as a matter of principle. But at the same time, they are highly coveted because of their potential to improve the entire healthcare system. In France, two major historical databases, SNIIRAM and PMSI, are dedicated to the collection and processing of health data. Although these databases do not contain any personally identifying information, they have long been accessible only under very strict conditions, sometimes difficult to understand, in the name of respect for the privacy of individuals. However, difficult access to these databases represents a proven loss of knowledge, and legal and technical means exist to ensure data security and the right to privacy of individuals. It is for this reason in particular that the procedures for accessing the personal health data contained in these databases have been completely reformed and continue to be reformed. To fully understand the process that led to the recent opening of medico-administrative databases, this study focuses on how access to these data has worked from their creation to the present day. With regard to the types of access that exist, this requires positioning oneself from three angles: that of privileged public actors who benefit from permanent access; that of ordinary public actors and private non-profit actors who can access certain data by complying with a prior authorization regime; and that of private for-profit actors who were first excluded from access to health data before finally being admitted. The evolution of access to this sensitive data is still a headlining topic due to a further reform of the governance of medico-administrative databases and their content. This new project aims to ensure that the protection of the right to privacy is combined with the widest possible access to as much health data as possible
Scholler, Rémy. "Analyse de données de signalisation mobile pour l’étude de la mobilité respectueuse de la vie privée : Application au secteur du transport routier de marchandises." Electronic Thesis or Diss., Bourgogne Franche-Comté, 2024. http://www.theses.fr/2024UBFCD001.
Full textMobile network operators have a significant data source derived from communications of all connected objects (not just smartphones) with the network. These signaling data is a massive source of location data and are regularly used for the mobility analysis. However, potential uses face two major challenges: their low spatiotemporal precision and their highly sensitive nature concerning privacy.In the first phase, the thesis work enhances the understanding of the mobility state (stationary or in motion), speed, direction of movement of connected objects, and the route they take on a transportation infrastructure (e.g., road or rail).In the second phase, we demonstrate how to ensure the confidentiality of continuously produced mobility statistics. The use of signaling data, whether related to users or various connected objects, is legally regulated. For the study of mobility, operators tend to publish anonymized statistics (aggregated data). Specifically, the aim is to calculate complex and anonymized mobility statistics "on the fly" using differential privacy methods and probabilistic data structures (such as Bloom filters).Finally, in the third phase, we illustrate the potential of signaling data and the proposed approaches in this manuscript for quasi-real-time calculation of anonymous statistics on road freight transport. However, this is just an example of what could apply to other subjects analyzing population behaviors and activities with significant public and economic policy implications
Jacques, Thibaut. "Protocoles d’attestation dans les environnements dynamiques." Electronic Thesis or Diss., Limoges, 2024. http://www.theses.fr/2024LIMO0078.
Full textNetwork Functions Virtualisation (NFV) is a networking paradigm where network functions are implemented as software running inside virtualised instances (such as virtual machines or containers) rather than on dedicated hardware. This results in a cloud-like architecture where the virtual network functions (VNFs) are managed on a platform called the Network Function Virtualisation Infrastructure (NFVI). The use of NFVs adds more flexibility to the network. Operators can easily adapt their network by adding, removing, or moving VNFs between servers to scale up or down, or to deploy new services on demand. However, with this flexibility come security challenges. The European Telecommunications Standards Institute (ETSI) recommends the use of remote attestation as one of the tools to secure such an infrastructure. An attestation protocol is a two-party cryptographic protocol in which a prover provides evidence about one or more properties to a verifier. Deep attestation extends the concept of attestation to a virtualized environment, where both the virtual instance and the underlying infrastructure are attested. Although remote attestation, and to a lesser extent deep attestation, are not new techniques, current approaches are not suitable for the NFV environment. In this thesis, we propose three privacy-preserving attestation protocols for the NFV context. We formally prove the security of our proposals. In addition, we demonstrate the effectiveness of our protocols with implementations and experimental results. A first scheme establishes the concept of deep attestation and enhances the current state-of-the-art by providing a solution that strikes a balance between the security and performance of the two predominant existing methods. Based on this building block, we introduce two new schemes that respond to more complex use cases. These schemes take into account the privacy issues that arise in multi-tenant virtualised networks, while being efficient even on large infrastructures and maintaining the security guarantees of the basic building block
Bernes, Bénédicte. "La vie privée du mineur." Toulouse 1, 2006. http://www.theses.fr/2006TOU10035.
Full textThe last decades have seen minors getting even more self sufficient and more individualized within the society, but also within the family context. By the way, the Internatinal Convention on the rights of the Child has settled the basis of a right of the respect of the private life of minors. But, considering its vulnerability, minors cannot benefit from those dispositions. Indeed, subjected to the parental authority, children can benefit from a limited autonomy. Children private life seems to be compound to shrink away. Thus, the incapacity of children is justified by its need of protection related to their own interests. But, the International convention on children rights recommends a stronger power for children in terms of booth protection and autonomy. Since the interest of children is not limited to their protection, but it is extended to their personal blooming, children incapacity can be regarded to be inconsistent. Personally speaking, teenagers do not need parental authority. A sufficient protection could be granted to minors ; outside the parental responsability meanwhile children could use their individual freedom in compliance with their given rights. Thus, advocating the children individual rights seems accurate encompassing their parents. Hence, it would be appropriate to propose the adolescent minor's recognition a right to the respect of its personal life on condition that its own interest is keep safe. He could exercise this right thanks to a special capacity and oppose it even its parents
Ramsewak, Shamila. "La vie privée des fonctionnaires." Paris 13, 2011. http://scbd-sto.univ-paris13.fr/secure/ederasme_th_2011_ramsewak.pdf.
Full textDirrenberger, Géraldine. "Employeur, salarié et vie privée." Thesis, Montpellier 1, 2012. http://www.theses.fr/2012MON10032.
Full textThe border between private and professional life can be confusing. The notion of private life differs from the importance each individual allows it, it follows as well the evolution of the society. Inside the working relationship, distinguished among the subordination connection, which priority should we assign it ? If there is agreement that in the working place a remaining private sphere truly exists, how can we efficiently unite it with the productivity requirements of the working environment ? Despite a strong protection of the employee's private life, the professional sphere stepping into the private one is an additional risk to see this idea to lose its meaning. The goal of our study is to point out the changes that occurred at work especially with the use of new technologies and the difficulties experienced due to the requirements to respect the employee's personal freedom. In this context we are considering some solutions to have those two spheres working together despite the balance requirement that must oversee the working relationship
Dos, Santos Jessye. "Réseaux de capteurs et vie privée." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM035/document.
Full textPrivacy notion is frequently linked with cyber attack examples by media and scientific researches. In 2012, the hacking of 12 millions Apple user identifiers demonstrates that connected objects represent leaks exploited by hackers to access to user personal data. In this thesis, we will extend the privacy notion to the objects. To do this, we will show that in wireless sensor networks where communications are carried out from machine-to-machine, the knowledge of the static addresses of the devices within the network discloses information allowing deduction about elements of context and environment.Nowadays, the wireless communication standards provide security mechanisms whatever the communication protocols used including the low power ones designed to run on constrained environment. However, the frame header that comprises necessary information for routing and for the proper functioning of the network is always sent in clear text. Collecting and gathering these metadata by eavesdropping is dangerous for the environments and applications based on these networks.The work carried out in this thesis aims to explore how simple passive attacks on meshed networks based on IEEE 802.15.4 used to collect and exploit metadata allow to infer critical information about the network, the environment where the network is deployed and the behavior of users. Two kinds of solutions to hide the node addresses are studied. The first one provides anonymity for the devices. In the second kind of solutions, pseudonyms are used by nodes enabling the capability to audit the traffic within the network.To evaluate the characteristics and the performances of the solutions, a simulator has been used to reproduce the behavior of a meshed wireless sensor network embedding Contiki OS. This simulator allows to compare the performances of MT6D the most promising solution of our state of the art with that of a reference network do not mask the metadata. With this analyze, we can highlight some drawbacks and more especially the control frames overhead needed for the routing. We give the necessary specifications to deploy the most optimal solution for the embedded devices.Thus we propose Ephemeral that allows hiding device addresses provided in the sent frames by using pseudonyms without overhead on the control frames. After deployment in the simulation environment to evaluate expected theoretical performances, Ephemeral has been tested in real environment. The network is made up of twenty IEEE 802.15.4 sensor nodes deployed on a building. The results show that Ephemeral is an efficient low power and bandwidth-saving solution to hide device identifiers used in wireless communications
Nitard, Evelyne. "La Vie privée des personnes célèbres." Paris 10, 1987. http://www.theses.fr/1987PA100146.
Full textTo deal with the private life of famous people is to get in difficulty immediately because such a subject introduces antinomic notions that must be tried to be conciliated daily. Different persons - the famous people, the media and the public - are implicated as asserting opposed moral and financial points of view and interests. To assure the protection of famous persons' private life, we must examine quality and quantity of regularly committed slurs, then we must try to form a true notion of private life and finally we must investigate which sanctions are considered and which are possible
Pillot, Guillaume. "Anonymat et vie privée sur internet." Master's thesis, Université Laval, 2018. http://hdl.handle.net/20.500.11794/32469.
Full textSince the beginning of this century, the explosion of the internet has had an important social and economic impact. Today, the number of internet users has approached four billion and it has become a part of our daily lives. More and more information circulates on the internet and since Edward Snowden's global surveillance disclosure in 2013, the public is now aware about the necessity to protect their private lives. In a rst time, this thesis introduces anonymity and privacy general concepts'. Then, the following popular anonymous networks are studied: JAP, Mixmaster, TOR and I2P. We will see that the best protection for these network is their size. [1] has elaborates a payment system for remunerates the TOR relays in order to encourage Internet users to participate in the anonymous network. We will see how adapt this system on the I2P anonymous network.
Kameni, Guy Marcel. "La vie privée en droit camerounais." Thesis, Toulouse 1, 2013. http://www.theses.fr/2013TOU10004/document.
Full textPrivacy, cryptic and contingent concept, has no legal definition in Cameroonian law like in the Western legislations such as France. This lightness of the legislator causes serious problems making privacy, an indeterminate legal object supporting the need for the determination of its legal value. Privacy is a legal object indeterminate because any definition effort is delicate and several notions seem to be part of its content and those who really hold. Privacy looks like a prerogative ofpersons. Only, the evolution of Information and Communication technology in general and social networking in particular, reveal everything related to the privacy of users sometimes with the consent of the latter who have not mastered the ins and outs of the mass media. In addition, looking for the manifestation of the truth, the right to information and communication to the public may justify violations of privacy. It is also difficult today to lead a discreet life as well for public figures, as for anonymous people. Privacy must be legally determinated. A gap between private life and public life seems more and more narrow, thus imposing a determination of the field of privacy as well as its regime. It is essential to identify the contours of privacy is based on elements such as family, health, and labour.Given its fundamental nature, the protection of privacy must be both on the internal and international plan, by the effectiveness of existing rules and development of specific texts. Similarly, the role of actors in justice is undeniable as in any other cases
La, Burgade Denis de. "La vie privée des hommes politiques." Paris 1, 2000. http://www.theses.fr/2000PA010335.
Full textChauvet, Delphine. "La vie privée : étude de droit privé." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA111006.
Full textPrivacy is a jurisprudential notion, recently established by the legislator. Nevertheless, it’s not yet clearly defined. Privacy lies within an utterly variable context. Consequently, its domain and legal system are difficult to determine. However, notions such as intimacy, identity and personality help apprehending the concept of privacy.The evolution of society and the spreading of new technologies have impacts on privacy. Jeopardized, it has to be better protected. French courts and European Court of Human Rights are attempting at this necessity.If privacy is subjected to a right of respect, its dispute isn’t limited to defense. Privacy also contributes to personal development.Yet, right of privacy is relative insofar as it draws antagonist interests, such as general interest and various particular interests.This study contributes to apprehending privacy with regard to the Law
Morgenroth, Thomas. "La vie privée en droit du travail." Thesis, Lille 2, 2016. http://www.theses.fr/2016LIL20016/document.
Full textBecause of its relativity, the concept of privacy is a difficult notion to define. French legislation defines it in different ways both between public institutions and citizens as well as among individuals. Moreover, the right to privacy presents an ambivalence as it gives an individual both a freedom of choice and a right of control. Therefore, privacy challenges employment laws which cannot deal satisfactorily with it as work relation has the specificity to create a link of subordination between private individuals. Yet, many of these dispositions contribute to protecting privacy. Though, in its civil law conception, there is some difficulty in resorting to privacy when it focuses on the secret of privacy.Paradoxically, the cases related to this subjective law and employees' privacy secret protection are far and few between. This freedom of privacy tends to ensure employees' protection in their privacy. Nevertheless, this freedom also applies in professional life and consequently appears as an essential instrument of the employee's protection in the workplace. Thus, the right for the employee's privacy to be respected inevitably tends to broaden its scope to the protection of freedom of privacy
Lolies, Isabelle. "La protection pénale de la vie privée." Aix-Marseille 3, 1998. http://www.theses.fr/1998AIX32060.
Full textMéchin, Elodie. "Le droit patrimonial à la vie privée." Thesis, Lyon 3, 2014. http://www.theses.fr/2014LYO30070.
Full textIn addition to the generally accepted non-patrimonial dimension or privacy, attributes have a patrimonial dimension. The right to privacy is now deemed to constitute intangible property largely exploited by its holder. Moreover, this commercial exploitation has opened the way for the existence of a second right pertaining to privacy, a right of a patrimonial nature which supplements non-patrimonial rights. However, this right is not upheld by case law, despite the fact that the courts are developing patrimonial personality rights under French law. Yet it is essential for positive law to protect privacy through a new regime which takes account of its dual nature. The copyright regime could very well be applied to privacy. As well as being closely linked to personality, privacy has a form which is perceptible to the senses. It is a creation of the individual himself. Everyone shapes his private life as he sees fit and makes it an original work. Thus, the monopoly of the author over his work appears to be a potential "patrimonial right to privacy."
Fleury, Aude. "Les parlementaires bordelais de 1750 à 1793 : vie publique, vie privée." Bordeaux 4, 1998. http://www.theses.fr/1998BOR40041.
Full textIn the first part, to improve our knowledge of the members of this parliament and the world they lived in, we have studied their cultural, economic and family background, as well as their office and their work. Judging from the documents we have been able to study, the members chose this particular office not because of the financial advantages they might obtain from it, but mainly for the prestige that came along with it. Indeed not anybody could accede to this station, and informal barriers as well as inviaible bridges were set up to maintain a certain level of cooptation, all the more so as the office thus acquired and fulfilled allowed the member to get acceed to nobility. The parliament is therefore socially quite homogeneous, all the more as it is strongly endogamous. It emerges that this group had a strengthh and coherence that must have helped it in its ambitions. That is why the second part consists of an appraisal of the relations between the compagnie and the various agents of power -both local and national-, to figure out their actual authority, and an analysis of the compagnie's specific functions. It appears that from the point of view of the royal administration, the parliament should have had no more than the rank of a departmental court accompanied with limited powers to make regional regulations and an optional counselling function. Yet, this is not what its members expected their functions to be. This explains why they developped "democratic" theories which undermined the french monarchic organisation but at the same time eroded the parliament's own legitimacy. Neither the members of the parliament nor their citizens seem to have been aware of this process which resulted in an escalation of affairs, each leading to more and more contestation and ending in the demand for the meeting of the states general. To conclude, it makes no doubt that the failure of the members and of the parliament of bordeaux is due to their opposition to the forces that were to gradually influence and dominate the course of french history. This institution was both too old and too sclerosed to get over the hurdle of 1789, which is also a revolution in intellectual thought. From that point, society came back to an elitism based upon individual merit. The buying of offices, and therefore wealth and family ties were no longer relevant in this new system. At that point
Legout, Arnaud. "Efficacité et vie privée : de BitTorrent à Skype." Habilitation à diriger des recherches, Université de Nice Sophia-Antipolis, 2012. http://tel.archives-ouvertes.fr/tel-00663950.
Full textRoca, Gregory. "La vie privée et familiale du majeur protégé." Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM1034.
Full textNeglected by the various European legislators for a long time, incapacity Law has been a primary focus since the late nineties. Influenced by the European Council, France has undertaken a more humanistic reform. The new legislation should help to protect the most vulnerable ones while ensuring the exercise of their fundamental rights, including the right for respect of privacy. This dual objective seems both unrealistic and contradictory at the same time since all protection measures lead to capacity restrictions and therefore impact the most intimate decisions the protected adult has to make.Yet, wherever the protected adult live, in the city or in an institution, the llaw seems to have found balance. This is the result of a particular importance given to the natural ability, the will but also the autonomy of the individual.However, the system is not perfect. Sometimes, the legislator did not dare to go further and maintains disabilities by principle in areas the most related to the protected person’s privacy. At other times however, it goes too far choosing autonomy over protection. Improvements are needed. To this end, it is possible to consider the removal of the remaining disabilities and replace them with a protection scheme adjusting to the degree of disability of the individual. It is also possible to imagine a generalization of the assistance which is appropriate when decisions are closely related to the person
Somé, Dolière Francis. "Sécurité et vie privée dans les applications web." Thesis, Université Côte d'Azur (ComUE), 2018. http://www.theses.fr/2018AZUR4085/document.
Full textIn this thesis, we studied security and privacy threats in web applications and browser extensions. There are many attacks targeting the web of which XSS (Cross-Site Scripting) is one of the most notorious. Third party tracking is the ability of an attacker to benefit from its presence in many web applications in order to track the user has she browses the web, and build her browsing profile. Extensions are third party software that users install to extend their browser functionality and improve their browsing experience. Malicious or poorly programmed extensions can be exploited by attackers in web applications, in order to benefit from extensions privileged capabilities and access sensitive user information. Content Security Policy (CSP) is a security mechanism for mitigating the impact of content injection attacks in general and in particular XSS. The Same Origin Policy (SOP) is a security mechanism implemented by browsers to isolate web applications of different origins from one another. In a first work on CSP, we analyzed the interplay of CSP with SOP and demonstrated that the latter allows the former to be bypassed. Then we scrutinized the three CSP versions and found that a CSP is differently interpreted depending on the browser, the version of CSP it implements, and how compliant the implementation is with respect to the specification. To help developers deploy effective policies that encompass all these differences in CSP versions and browsers implementations, we proposed the deployment of dependency-free policies that effectively protect against attacks in all browsers. Finally, previous studies have identified many limitations of CSP. We reviewed the different solutions proposed in the wild, and showed that they do not fully mitigate the identified shortcomings of CSP. Therefore, we proposed to extend the CSP specification, and showed the feasibility of our proposals with an example of implementation. Regarding third party tracking, we introduced and implemented a tracking preserving architecture, that can be deployed by web developers willing to include third party content in their applications while preventing tracking. Intuitively, third party requests are automatically routed to a trusted middle party server which removes tracking information from the requests. Finally considering browser extensions, we first showed that the extensions that users install and the websites they are logged into, can serve to uniquely identify and track them. We then studied the communications between browser extensions and web applications and demonstrate that malicious or poorly programmed extensions can be exploited by web applications to benefit from extensions privileged capabilities. Also, we demonstrated that extensions can disable the Same Origin Policy by tampering with CORS headers. All this enables web applications to read sensitive user information. To mitigate these threats, we proposed countermeasures and a more fine-grained permissions system and review process for browser extensions. We believe that this can help browser vendors identify malicious extensions and warn users about the threats posed by extensions they install
Mathieu, Chantal. "La vie personnelle du salarié." Lyon 2, 2004. http://theses.univ-lyon2.fr/documents/lyon2/2004/mathieu_c.
Full textWithin French law, there is no text that concedes to a subordinate worker a "right to the respect of his personal life". Nonetheless, the law does not ignore this aspect of the employee life and this thesis intends to show how it is legally protected. First of all, a wall is drawn up between personal life and professional life in order to protect the former from the key players of working relationships. This separation aims to prevent his personal choices from interfering with his professional life. Accordingly, one can highlight a requirement to dissociate personal life from working relationships, and specific warranties can be attached to this requirement. Moreover, some doors can be opened between the employee's personal world and his professional world in order to facilitate a conciliation between these two dimensions of the employee life. The intention is therefore to provide the means to face his personal constraints or to invest in a personal project without sacrificing his professional life. Nonetheless, this opportunity to take into consideration the personal situation of an employee is limited to certain aspects of his life and in particular the ones attached to his family life. This consideration on its own is also limited as it can conflict with other interests, most notably the company's interests. Combining logic of separation and logic of conciliation implies that the latter prevails on the respect of the former. At last, it belongs to the employee, and only to him, to open the doors that separate his personal life from his professional life
Aïvodji, Ulrich Matchi. "Technologies respectueuses de la vie privée pour le covoiturage." Thesis, Toulouse 3, 2018. http://www.theses.fr/2018TOU30017/document.
Full textThe emergence of mobile phones and connected objects has profoundly changed our daily lives. These devices, thanks to the multitude of sensors they embark, allow access to a broad spectrum of services. In particular, position sensors have contributed to the development of location-based services such as navigation, ridesharing, real-time congestion tracking... Despite the comfort offered by these services, the collection and processing of location data seriously infringe the privacy of users. In fact, these data can inform service providers about points of interests (home, workplace, sexual orientation), habits and social network of the users. In general, the protection of users' privacy can be ensured by legal or technical provisions. While legal measures may discourage service providers and malicious individuals from infringing users' privacy rights, the effects of such measures are only observable when the offense is already committed and detected. On the other hand, the use of privacy-enhancing technologies (PET) from the design phase of systems can reduce the success rate of attacks on the privacy of users. The main objective of this thesis is to demonstrate the viability of the usage of PET as a means of location data protection in ridesharing services. This type of location-based service, by allowing drivers to share empty seats in vehicles, helps in reducing congestion, CO2 emissions and dependence on fossil fuels. In this thesis, we study the problems of synchronization of itineraries and matching in the ridesharing context, with an explicit consideration of location data (origin, destination) protection constraints. The solutions proposed in this thesis combine multimodal routing algorithms with several privacy-enhancing technologies such as homomorphic encryption, private set intersection, secret sharing, secure comparison of integers. They guarantee privacy properties including anonymity, unlinkability, and data minimization. In addition, they are compared to conventional solutions, which do not protect privacy. Our experiments indicate that location data protection constraints can be taken into account in ridesharing services without degrading their performance
Solminihac, Arnaud de. "La vie privée : les racines d'un concept juridique protéiforme." Electronic Thesis or Diss., Université Paris-Panthéon-Assas, 2022. http://www.theses.fr/2022ASSA0019.
Full text"Privacy" or "private life" is regarded as a general notion of the french law. This words appears for the first time France during the French Constitution to protect individual reputations. Under this report, private protection is an extension of the concept of defamation as it was understood under ancien law. According to old law conception, infamous revelations must be repressed even if they are true. This approach presupposes that personal information has no place in the public space. In the same way the rule of secrecy is institutionalized in order to protect specific relationships: the secret of confession, secret of letters, confidential medical information, etc. This thesis intends to link the concrete protections of the private sphere to Western history in general
Nadeau, Alain-Robert. "Vie privée et droits fondamentaux : étude de la protection de la vie privée en droit constitutionnel canadien et américain et en droit international." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/NQ57059.pdf.
Full textNieto, Adrien. "La vie privée à l'épreuve de la relation de soin." Thesis, Montpellier, 2017. http://www.theses.fr/2017MONTD024/document.
Full textThe existence of legal mechanisms for the protection of privacy under common law is irrefutable. Those that the patient can claim during the care relationship remain unclear. The specific nature of this relationship, and the physical and moral impairments to privacy that are consumed in it - look, touch, nudity and the exchange of private information - justify a special framework and specific protections, existing but repensable, for accompany the stakes posed by the evolution and the modification of the care relationship. The emergence of new actors in health, with their own aspirations, undoubtedly modifies the objective and consequences of this relationship. Health data, an underestimated component of privacy, in that it n° longer passes only from the patient to the healthcare professional - and vice versa - must be framed, both the economic and political stakes associated with it . The "value" of privacy must be refocused, at a time when consumption, instantaneous exchange of information and “publicy” seem to have taken precedence over it
Doumeng, Valérie. "La vie privée du majeur malade mental ou déficient intellectuel." Toulouse 1, 1998. http://www.theses.fr/1998TOU10034.
Full textThe private life of an adult suffering from a mental illness or a mental retardation has a number of distinctive features vis-a-vis the private life of a person who can be considered in full mental health. The difference stems firstly from the need, in certain cases, for an individual whose mental faculties are impaired, to be placed in a psychiatric hospital or to live in a social or medico-social institution. His freedom to come and go and to freely plan his every day life is thus partially or even totally restricted. What is more, outsiders may be led to interfere in some aspects of the private life of the mentally impaired such as emotional life, reproductive freedom and health. This state of facts poses some delicate problems. With regard to the mentally ill or handicapped that retain legal capacity, outsiders, apart form certain specific cases, have no power and their interference may be considered improper. When they are classified in one of the categories of legally incapable persons, the law turns out to be deficient. However, the courts who are confronted with numerous practical problems have recognised that the legal representatives have a role in the protection of the incapable adult. However, we must ask ourselves if it is possible to "manage" the private life of an incapable person in the same way in which one manages a person's pecuniary affairs, using the same techniques and with the same coldness
Favre, Didier. "De l'homogénéité européenne dans l'insuffisante protection de la vie privée." Montpellier 1, 1992. http://www.theses.fr/1992MON10012.
Full textKaim, Guillaume. "Cryptographie post-quantique pour la protection de la vie privée." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S077.
Full textThe past few years have seen the rising of the quantum computers, that are a serious threat to nearly all the actual cryptographic schemes used in practice. In this thesis we propose some new constructions to prevent this obsolescence by building our schemes on the mathematical tool of lattices that is assumed post-quantum resistant. We firstly develop a group signature scheme, allowing each member composing the group to anonymously sign on the behalf of the group. We add a supplementary property, which is the froward secrecy. This property cut the time in periods, such that each secret key is updated when entering a new period. We also propose a blind signature scheme, which is an interactive protocol between an user, who wants to sign a message, with a signer who possesses the signing secret key. We improve the state-of-the art by proposing a constructions without any restart and with a more efficient security. Finally as a use case of the blind signature, we develop an evoting protocol that take as a basis the construction described above
Crosnier, Sébastien. "Le droit à la vie privée à l'épreuve de l'internet." Paris 11, 2000. http://www.theses.fr/2000PA111022.
Full textFaravelon, Aurélien. "Une démarche de conception et d'implémentation de la protection de la vie privée basée sur le contrôle d'accès appliquée aux compositions de services." Thesis, Grenoble, 2013. http://www.theses.fr/2013GRENM036/document.
Full textPrivacy is hot topic. Lawyers, technicians and plain people are all concerned by this notion. Nowadays, most discussions focus on the effects of digital tools, such as social media or surveillance software. However, privacy is still ill-defined. Moreover, digital tools which endanger privacy are widely used. Should not we leave privacy aside and accept that we are, maybe more than ever, visible ?In this doctoral thesis, I address this question from a twofold viewpoint. I first inquire into the nature of our digital condition from a philosophical standpoint. I claim that digital artifacts rework the implementation of our frontiers, be them geographical or social. However, I contend that such frontiers are necessary. As I show that code defines the structure and the effects of digital tools, I point out that properties such as privacy management should be addressed right from the conception of software applications.Helping out designers to address such properties is the second issue I tackle. I focus on Service-Oriented Computing as it is a widely used paradigm. Most speci- fically, I deal with the composition of heterogenous and dynamic services. I define access control as an efficient mechanism to protect privacy and I propose a twofold generative approach to secure services compositions. The composition and its access control policies are separately defined at an abstract level. An expert is responsible for each of them. As we promote an abstract description of the application, we free the designer from technical complexity. At runtime, we propose an architecture which selects and protects the actual services by hiding them behind proxies which run the access control policy. Automated model transformations permit to generate the application from its specification. We thus bypass manual programming. We have implemented a modeling and execution environment and applied our approach to a use case in order to validate our work
Antignac, Thibaud. "Méthodes formelles pour le respect de la vie privée par construction." Thesis, Lyon, INSA, 2015. http://www.theses.fr/2015ISAL0016/document.
Full textPrivacy by Design (PbD) is increasingly praised as a key approach to improving privacy protection. New information and communication technologies give rise to new business models and services. These services often rely on the exploitation of personal data for the purpose of customization. While privacy is more and more at risk, the growing view is that technologies themselves should be used to propose more privacy-friendly solutions. Privacy Enhancing Technologies (PETs) have been extensively studied, and many techniques have been proposed such as anonymizers or encryption mechanisms. However, PbD goes beyond the use of PETs. Indeed, the privacy requirements of a system should be taken into account from the early stages of the design because they can have a large impact on the overall architecture of the solution. The PbD approach can be summed up as ``prevent rather than cure''. A number of principles related to the protection of personal data and privacy have been enshrined in law and soft regulations. They involve notions such as data minimization, control of personal data by the subject, transparency of the data processing, or accountability. However, it is not clear how to translate these principles into technical features, and no method exists so far to support the design and verification of privacy compliant systems. This thesis proposes a systematic process to specify, design, and verify system architectures. This process helps designers to explore the design space in a systematic way. It is complemented by a formal framework in which confidentiality and integrity requirements can be expressed. Finally, a computer-aided engineering tool enables non-expert designers to perform formal verifications of the architectures. A case study illustrates the whole approach showing how these contributions complement each other and can be used in practice
Yassine, Kassab Maha. "La femme dans quelques scènes de la vie privée de Balzac." Bordeaux 3, 1986. http://www.theses.fr/1986BOR30046.
Full textThe study of woman through the important steps of her life, in certain "scenes of private life" (between one thousand, eight hundred and thirty - thirty two) ; this study shows double attitude, taken by balzac towards woman, an explicite as well as an implicite attitudes. The first one invites the feminine character to sacrifice for society, while the second on the contrary of woman nature, constitutes an encouraging factor to revolt against society which sacrifices the woman for the benefit of society. The principal cause of the ambiguous attitude of balzac might be explained of the permanant conflict existing between the inactive role of the wise man, and destructive passion. The inactive role of the wise represents the duration, the rest, economy in vital forces, all of which preserve the life of the individual. Thus, the society which has the objective of continuity detain the rush of individual against passion, by applying this rule for saveguarding and preserving the vital fluidity. The destructive passion represents the passion, the active thinking, the movement, all of which dispense with the vital fluidity existing in every body; it is the force which pushes the individual to revolt against social rules, to live his full life and to be finally used up : it is the creative force. Man, according to balzac, is constantly subject to conflict between these two scopes of life that are completely contradictory, because it is impossible to select the way of living which should be exactly in the midst; that is why the balzacian character is divided into two forms : passive character and the revolutionary character
Yassine, Kassab Maha. "La femme dans les "Scènes de la vie privée" de Balzac." Bordeaux 3, 1991. http://www.theses.fr/1991BOR30034.
Full textA study of the woman in balzac's private life scenes through the most important steps of her life (education, love, marriage,. . . ), in period where she was considered intelectually inferior to the man. The analysis of both implicit and explicit balzac's attitude towards woman's problems
Jacquelet, Cédric. "La vie privée du salarié à l'épreuve des relations de travail." Paris 2, 2006. http://www.theses.fr/2006PA020049.
Full textJammet, Adrien. "La prise en compte de la vie privée dans l’innovation technologique." Thesis, Lille 2, 2018. http://www.theses.fr/2018LIL2D003/document.
Full textThe study of privacy within technological innovations is the study of the legal system surrounding personal data. However, the complexity and context of the subject imposes a pragmatic analysis, gathering elements of economy and technology, to define the reality of the use of the law by and within numerical innovations. As such, it necessitates a phenomenological approach, reviewing the historical steps that lead to the particular set of protections that the legislator has chosen, from a general protection of privacy towards a special regime applicable to personal data, and then an observation of its effectiveness to protect the essence of privacy. At the center of this work, we can find the will to understandthe gap between the trust given by the public to technology regarding the respect of one’s privacy and the declarations of legislators on the efficiency of the legislative response. Since the consent is the core principle of these regulations, this divergence deserves a legal analysis. Consequently, we can sum this thesis by a simple question: what it the real efficiency of privacy’s protection regime facing technological innovations ?
Fouladgar, Sépideh. "Protocoles de protection de la vie privée pour les systèmes RFID." Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0013.
Full textBalgobin, Yann. "Contribution à l'économie de la vie privée et des données financières." Electronic Thesis or Diss., Paris, ENST, 2018. http://www.theses.fr/2018ENST0038.
Full textThis thesis investigates the economic consequences of consumers’ control over the level of personal information they are willing to share with firms. This subject is vital for the digital economy as many firms collect and use information about consumers to increase their revenues. Firms may face greater difficulty to generate profit from personal data. Firstly, because consumers are increasingly concerned about their privacy. Secondly, because more and more privacy-enhancing technologies (PETs) become available. We find in the thesis that the use of PETs could positively influence consumers’ willingness to share personal information, enabling a data collection that takes privacy concerns into account. We make similar conclusions in the case of financial information. Developing the use of non-bank payment instruments (and thus allowing consumers to hide some information to banks) could benefit e-commerce, leading consumers to buy more online. Finally, in a context where consumers are concerned with their privacy, banks may benefit from making screening less intrusive, as it would improve their lending strategy
Elkhiyaoui, Kaoutar. "Sécurité et protection de la vie privée dans les systèmes RFID." Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00990228.
Full textElkhiyaoui, Kaoutar. "Sécurité et protection de la vie privée dans les systèmes RFID." Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0040.
Full textWhile RFID systems are one of the key enablers helping the prototype of pervasive computer applications, the deployment of RFID technologies also comes with new privacy and security concerns ranging from people tracking and industrial espionage to produ ct cloning and denial of service. Cryptographic solutions to tackle these issues were in general challenged by the limited resources of RFID tags, and by the formalizations of RFID privacy that are believed to be too strong for such constrained devices. It follows that most of the existing RFID-based cryptographic schemes failed at ensuring tag privacy without sacrificing RFID scalability or RFID cost effectiveness. In this thesis, we therefore relax the existing definitions of tag privacy to bridge the gap between RFID privacy in theory and RFID privacy in practice, by assuming that an adversary cannot continuously monitor tags. Under this assumption, we are able to design sec ure and privacy preserving multi-party protocols for RFID-enabled supply chains. Namely, we propose a protocol for tag ownership transfer that features constant-time authentication while tags are only required to compute hash functions. Then, we tackle the problem of product genuineness verification by introducing two protocols for product tracking in the supply chain that rely on storage only tags. Finally, we present a solution for item matching that uses storage only tags and aims at the automation of safety inspections in the supply chain.The protocols presented in this manuscript rely on operations performed in subgroups of elliptic curves that allow for the construction of short encryptions and signatures, resulting in minimal storage requirements for RFID tags. Moreover, the privacy and the security of these protocols are proven under well defined formal models that take into account the computational limitations of RFID technology and the stringent privacy and security requirements of each targeted supply chain application
Durbet, Axel. "Une approche cryptographique des systèmes d'authentification biométrique respectant la vie privée." Electronic Thesis or Diss., Université Clermont Auvergne (2021-...), 2024. http://www.theses.fr/2024UCFA0113.
Full textThe aim of this thesis project is to address as fully as possible to the PRIVABIO project. Thus, we will seek to solve or mitigate security and privacy issues in the usage of biometrics. To do so, we will propose low-cost protocols with security guarantees proportional to the high sensitivity of such personal data. The project will focus on 4 areas: 1/ Assess the security of biometric template protection (BTP) schemes and biometric protocols. 2/ Provide more secure BTP schemes without reducing recognition accuracy, and without compromising their usability on devices with limited resources. 3/ Identify cryptographic mechanisms of interest for privacy protection. 4/ Integrate biometric and cryptographic mechanisms into multi-factor authentication and identification protocols while providing formal security guarantees
Charlebois, Éric. "L'histoire de la vie privée au Canada entre 1960 et 1990: Les perspectives des ministres et des députés de la Chambre des communes sur la vie privée." Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27818.
Full textMounguengui, Claude Marlette. "Représentations sociales, conciliation vie privée-vie professionnelle. Pour une comparaison interculturelle auprès des infirmières françaises et gabonaises." Thesis, Reims, 2016. http://www.theses.fr/2016REIML001.
Full textThis thesis is based on the Social Representation theory. Starting with interviews of French nurses (N=29) and Gabonese nurses (N=23), we focused on the comparative social representations of both the profession of a nurse and the family. We then proceeded with a questionnaire composed of free association tasks, of a specific tool measuring the dominant type of practice and the SWING. 103 French nurses and 140 Gabonese nurses filled in this questionnaire. The results show a distinct representation of the profession according to the culture. The French nurses focus on the importance of the relationship that needs to be establishes with the patients, while the Gabonese nurses add to this the need for affection. The nurses were separated into contrasted groups according to the scores obtained both in terms of dominant practices 5technical or related to relations) and according to their life balance type. The social representation of the profession, which was studied for each of these contrasted groups, appears to be clearly different according to both variables. Moreover, in terms of the social representations of the family, a significant distinctions appears based on the two cultures: the French participants perceive the nuclear family, while the Gabonese participants combine the traditional family with the new model, close to the French nuclear one.Key words: Social Representations; Nurses; Life Balance; Healing; France; Gabon.Université de Reims Champagne-Ardenne - Laboratoire EA 6291 - C2S -Bâtiment 13 Recherche - 57 rue Pierre Taittinger - 51100 REIMS
Ajam, Nabil. "Privacy protection for location-based services." Télécom Bretagne, 2010. http://www.theses.fr/2010TELB0124.
Full textIn this dissertation, we propose the expression and the modelling of the most important principles of privacy. We deduce the relevant privacy requirements that should be integrated in existing security policy models, such as RBAC models. We suggest the application of a unique model for both access control and privacy requirements. Thus, an access control model is to be enriched with new access constraints and parameters, namely the privacy contexts, which should implement the consent and the notification concepts. For this purpose, we introduce the privacy-aware Organisation role Based Access Control (OrBAC) model. The administration of this new model is significantly different from previous models. Three cases are identified. First, the privacy policy may be defined by the data collector but data owners have the possibility to set their preferences through a contracted Service Level Agreement (SLA). Second, the administration model allows legal organisations, for legal purposes, to impose their needs by bypassing user's preferences. Third, we present the case of a privacy policy which is negotiated between the data collector and the requestor based on user's preferences, defined in the SLA. Overall, our proposal is a distributed administration of privacy policies. Focusing on Location Based Services (LBSs), we finally propose a complete privacy framework ready to be deployed in information systems. We use the model prototype to adapt our solution to cellular networks when the requesters are the service providers. This prototype uses parlay gateways with web services. We also extend the set of Parlay X gateway standardised web services by proposing a dedicated privacy web service to enforce privacy protection
Oulmakhzoune, Said. "Enforcement of Privacy Preferences in Data Services: A SPARQL Query Rewriting Approach." Télécom Bretagne, 2013. http://www.telecom-bretagne.eu/publications/publication.php?idpublication=133858.
Full textWith the constant proliferation of information systems around the globe, the need for decentralized and scalable data sharing mechanisms has become a major factor of integration in a wide range of applications. Literature on information integration across autonomous entities has tacitly assumed that the data of each party can be revealed and shared to other parties. A lot of research, concerning the management of heterogeneous sources and database integration, has been proposed, for example based on centralized or distributed mediators that control access to data managed by different parties. On the other hand, real life data sharing scenarios in many application domains like healthcare, e-commerce market, e-government show that data integration and sharing are often hampered by legitimate and widespread data privacy and security concerns. Thus, protecting the individual data may be a prerequisite for organizations to share their data in open environments such as Internet. Work undertaken in this thesis aims to ensure security and privacy requirements of software systems, which take the form of web services, using query rewriting principles. The user query (SPARQL query) is rewritten in such a way that only authorized data are returned with respect to some confidentiality and privacy preferences policy. Moreover, the rewriting algorithm is instrumented by an access control model (OrBAC) for confidentiality constraints and a privacy-aware model (PrivOrBAC) for privacy constraints. A secure and privacy-preserving execution model for data services is then defined. Our model exploits the services¿ semantics to allow service providers to enforce locally their privacy and security policies without changing the implementation of their data services i. E. , data services are considered as black boxes. We integrate our model to the architecture of Axis 2. 0 and evaluate its efficiency in the healthcare application domain
Kindarji, Bruno. "Questions de sécurité et de vie privée autour des protocoles d'identification de personnes et d'objets." Phd thesis, Paris, Télécom ParisTech, 2010. https://pastel.hal.science/pastel-00006233.
Full textThe term 'identification' refers to a situation where a person, or a communicating device, provides an element that ensures its automatic recognition. This differs from authentication in which the claimed identity is proved with credentials. We take interest in both the identification of people and devices; the former goes through biometrics, and we study the particular case where devices communicate through electromagnetic waves. These situations raise the issues of security and privacy. Security is a confidence level in the outcome of the identification; privacy ensures that an eavesdropper cannot infer information from public elements. We show that in order to design private biometric identification protocols, special care must be taken for the storage of the biometric data. We describe several such protocols that are based on cryptographic primitives. We also show how to use identification codes to design a protocol for private interrogation of low-cost wireless devices, both private and secure
Athea, Valene. "La gouvernance d'entreprise face au respect de la vie privée des salariés." Thesis, Paris Est, 2015. http://www.theses.fr/2015PESC0063/document.
Full textThe notion of governance seems to cover themes close to the term "to govern", of the grip of decision and the evaluation.It represents all the organs and the rules of decision, information (transparency) and supervision allowing the legal successors and the partners of a company, to see their respected interests and their voices in the functioning of this one.The governance of company proposes a new conception of the process of decision, granting all its place to the dialogue between the stakeholders.The union representative intervenes in this sense, indeed, he has a mission of claiming (for example concerning the increase in salaries), he is the interlocutor of the labor union(syndicate) with the employer, he negotiates with the latter the standards of the company (agreements and collective labor agreements)Framed by laws assuring the essential transparency, the governance of company would be in theory the way to assure at best the multiple interests of the actors concerned (employees and employers).It is the reason why it seemed convenient to draw a parallel between the exercise of the governance of company by the concerned actors and the respect for private life of the employees.The governance of company can be limited by the respect for private life of the employees.It is about a fundamental law, proclaimed by the law, registered in the bill of rights of 1948 (article 12), the European Convention on Human Rights and fundamental liberties (article 8), on the article 9 of the Civil code and on the article 226-1 of the Penal code.The components of the private life were not the object of a definition or a restrictive enumeration to avoid limiting the protection to the only legal forecasts. The courts applied the principle of this protection, in the right to life sentimental and in the family life, in the secret concerning the health, concerning the secret of the residence and the place of residence, and concerning the right(law) for the image
Alamelou, Quentin. "Protocoles cryptographiques pour l’authentification numérique et le respect de la vie privée." Thesis, Limoges, 2017. http://www.theses.fr/2017LIMO0042/document.
Full textInternet constant growth has naturally led to cryptographic issues such as authentication and privacy concerns. The common usage of connected devices (smartphones, tablet, watch, …) as authentication means made us consider cryptographic keys generations and/or managements from such devices to address aforementioned needs. For such a purpose, we identified fuzzy extractors and group signature schemes. On the one hand, this thesis then presents the first reusable fuzzy extractor based on set difference metric (in the nonprogrammable random oracle). In so doing, we were able to design a key generation module performing authentication from users’ devices. On the other hand, we came up with two group signature schemes, respectively based on Hamming and rank metrics, that seriously compete with post-quantum concurrent schemes based on lattices