Academic literature on the topic 'Sécurité du système'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sécurité du système.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Sécurité du système"
Brown, Robert L. "Security for Social Security –Is Privatization the Answer?" Canadian Journal on Aging / La Revue canadienne du vieillissement 16, no. 3 (1997): 499–518. http://dx.doi.org/10.1017/s071498080000876x.
Full textArcari, Maurizio. "Responsabilité de l'État pour violations graves du Droit International et système de sécurité collective des Nations Unies." Anuario Español de Derecho Internacional 21 (August 16, 2018): 415–47. http://dx.doi.org/10.15581/010.21.28397.
Full textEl Yacoubi El Idrissi, Houda, Driss Bouami, and Abdelghani Cherkaoui. "Système de management intégré vers un référentiel simple et élargi." Revue Française de Gestion Industrielle 29, no. 1 (March 1, 2010): 7–34. http://dx.doi.org/10.53102/2010.29.01.616.
Full textGheroufella, Maya. "Les réformes du système algérien de sécurité sociale face aux mutations du marché du travail : quel rôle dans la sous-couverture sociale ?" les cahiers du cread 38, no. 3 (September 3, 2022): 529–54. http://dx.doi.org/10.4314/cread.v38i3.19.
Full textWinters, Meghan, Moreno Zanotto, and Gregory Butler. "Système de classification du confort et de la sécurité des voies cyclables canadiennes (Can-BICS) : convention d’appellation commune des aménagements cyclables." Promotion de la santé et prévention des maladies chroniques au Canada 40, no. 9 (September 2020): 319–24. http://dx.doi.org/10.24095/hpcdp.40.9.04f.
Full textGaburici, Angela. "Sécurité alimentaire dans les pays en transition : le cas de la Roumanie." Économies et Sociétés. Série Développement agroalimentaire 29, no. 322 (1995): 79–90. http://dx.doi.org/10.3406/esag.1995.1692.
Full textSalas, Michel, J. Lator, and Christian Sheikboudou. "Mise au point d'un système d'engraissement de jeunes bovins Créole en milieu paysan guadeloupéen basé sur l'utilisation de la canne à sucre et du pâturage." Revue d’élevage et de médecine vétérinaire des pays tropicaux 44, no. 4 (April 1, 1991): 469–74. http://dx.doi.org/10.19182/remvt.9155.
Full textAlpher, Joseph. "Israël, Jordanie, Palestine : un système de sécurité." Politique étrangère 57, no. 4 (1992): 809–23. http://dx.doi.org/10.3406/polit.1992.4149.
Full textRoșioru, Felicia. "La réforme du système de sécurité sociale." Revue de droit comparé du travail et de la sécurité sociale, no. 1 (April 1, 2018): 180–81. http://dx.doi.org/10.4000/rdctss.2060.
Full textMpia, Héritier Nsenge. "De la vulnérabilité des informations numériques dans les réseaux informatiques : Cas de l'infiltration à travers le rootkit." Revue Internationale Multidisciplinaire Etincelle 21, no. 1 (July 10, 2018): 1–13. http://dx.doi.org/10.61532/rime211111.
Full textDissertations / Theses on the topic "Sécurité du système"
Dhifallah, Mohamed Kamel. "Le système de sécurité sociale en Tunisie au regard du système de Sécurité Sociale en France." Bordeaux 1, 1995. http://www.theses.fr/1995BOR1D006.
Full textWe are going to make a comparaison between the french health care system and the tunisian health care system so as to analyse the latter. The social legislationn in tunisia, influenced by the french legislation came into existence carly in tunisia under the protectorat regime. But once the country became independent, the tunisian system was unable to follow the breaking off between the two systems. However, this did not prevent the instauration of a cooperation between the two sytems. Indeed, the health care general convention signed by both countries in 1965, is a good means of cooperation. In spite of the economic crisis striking the two countries, the two systemes should keep this degree of cooperation and try to improve it if possible. The exemple of the french-european cooperation as far as social security is concerned is to be followed
Dhifallah, Mohamed Kamel. "Le système de sécurité sociale en Tunisie au regard du système de Sécurité Sociale en France." Bordeaux 1, 1995. http://www.theses.fr/1995BOR40006.
Full textWe are going to make a comparaison between the french health care system and the tunisian health care system so as to analyse the latter. The social legislationn in tunisia, influenced by the french legislation came into existence carly in tunisia under the protectorat regime. But once the country became independent, the tunisian system was unable to follow the breaking off between the two systems. However, this did not prevent the instauration of a cooperation between the two sytems. Indeed, the health care general convention signed by both countries in 1965, is a good means of cooperation. In spite of the economic crisis striking the two countries, the two systemes should keep this degree of cooperation and try to improve it if possible. The exemple of the french-european cooperation as far as social security is concerned is to be followed
Dagorn, Nathalie. "Management de la sécurité de l'information : mise en oeuvre, évaluation et pilotage de la sécurité de l'information dans les organisations." Thesis, Nancy 2, 2011. http://www.theses.fr/2011NAN22006.
Full textThis thesis addresses the problem of information security management within organizations. Through a series of theoretical and empirical analyses, it proposes (i) an exploratory model of the engagement of organizations in the governance of information security based on the Unified Theory of Acceptance and Use of Technology by Venkatesh et al. (2003), (ii) a quantitative decision model for evaluation and forecasting of information security based on game theory by Von Neumann and Morgenstern (1944) in its stochastic version formalized by Shapley (1953), and (iii) a model of balanced scorecard using the original method of Kaplan and Norton (1992) for performance measurement and management of information security. Various methodological approaches have been applied to test these proposals, including a questionnaire survey (120 respondents), a brainstorming with votes (68 participants), an in-depth case study, two ex post analyses of fifteen security projects, a Metaplan session (32 participants), and a longitudinal case study. Our research results in an undeniable advance in traditional management models for information security, made possible by the use of interdisciplinary theoretical and methodological bases. In practice, the research provides the decision maker with a comprehensive framework for the management of information security, enabling him to engage the organization knowingly in the process, to evaluate its security status and establish forecasts or comparisons, to control and continuously improve the management of information security within the organization, and ultimately to contribute to the organization's overall performance and competitiveness
Goudalo, Wilson. "Vers une ingénierie avancée de la sécurité des systèmes d'information d'entreprise : une approche conjointe de la sécurité, de l'utilisabilité et de la résilience dans les systèmes sociotechniques." Thesis, Valenciennes, 2017. http://www.theses.fr/2017VALE0026/document.
Full textIn our era of the service industry, information systems play a prominent role. They even hold a vital position for businesses, organizations and individuals. Information systems are confronted with new security threats on an ongoing basis; these threats become more and more sophisticated and of different natures. In this context, it is important to prevent attackers from achieving their results, to manage the inevitable flaws, and to minimize their impacts. Security practices must be carried out within an engineering framework; Security engineering needs to be improved. To do this, it is proposed to develop systemic approaches, innovative on wide spectra and that work on several axes together, improving the user experience. Our goal is to jointly track down and resolve issues of security, usability and resiliency in enterprise information systems. In this doctoral thesis, we position sociotechnical systems in relation to the information systems of companies and organizations. We address paradigms of sociotechnical systems and refocus on the correlations between security, usability and resilience. A case study illustrates the proposed approach. It presents the development of design patterns to improve the user experience. The thesis concludes with an overall discussion of the approach, as well as research perspectives
Millon, Etienne. "Analyse de sécurité de logiciels système par typage statique." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2014. http://tel.archives-ouvertes.fr/tel-01067475.
Full textMillon, Etienne. "Analyse de sécurité de logiciels système par typage statique." Electronic Thesis or Diss., Paris 6, 2014. http://www.theses.fr/2014PA066120.
Full textOperating system kernels need to manipulate data that comes from user programs through system calls. If it is done in an incautious manner, a security vulnerability known as the Confused Deputy Problem can lead to information disclosure or privilege escalation. The goal of this thesis is to use static typing to detect the dangerous uses of pointers that are controlled by userspace. Most operating systems are written in the C language. We start by isolating Safespeak, a safe subset of it. Its operational semantics as well as a type system are described, and the classic properties of type safety are established. Memory states are manipulated using bidirectional lenses, which can encode partial updates to states and variables. A first analysis is described, that identifies integers used as bitmasks, which are a common source of bugs in C programs. Then, we add to Safespeak the notion of pointers coming from userspace. This breaks type safety, but it is possible to get it back by assigning a different type to the pointers that are controlled by userspace. This distinction forces their dereferencing to be done in a controlled fashion. This technique makes it possible to detect two bugs in the Linux kernel: the first one is in a video driver for an AMD video card, and the second one in the ptrace system call for the Blackfin architecture
Guts, Nataliya. "Auditabilité pour les protocoles de sécurité." Paris 7, 2011. http://www.theses.fr/2011PA077004.
Full textSecurity protocols often log some data available at runtime for an eventual a posteriori analysis, called audit. In practice, audit procedures remain informal, and the choice of log contents is left to the programmer's common sense. The goal of this dissertation is to formalize and verify the properties expected from audit ! logs. First we consider the use of logs in so called optimistic security protocols which, as opposed to classic security protocols, rely on the logs to postpone certain security checks until the end of execution. We formally study two optimistic schemes: value commitment scheme and offline e-cash; using process languages techniques, we prove that the information logged by their implementations suffices to detect the cheat of participants, if any. Then we define auditability as the ability of a protocol to collect enough evidence to convince an audit ! procedure (judge). We propose a method based on types with logical refinements to verify auditability, and ; implement it as an extension to an existing typechecker. We show that verifying auditability boils down to typechecking the protocol implementation. We also implement logical support for generic pre- and post-! conditions to enhance modular typechecking of higher-order functions
Bouchiba, Anass. "Evaluation de dysfonctionnement d'un système par approche bayesienne : cas du système ferroviaire." Angers, 2013. http://tel.archives-ouvertes.fr/tel-00842756.
Full textThe development of railway in urban and non urban, is accompanied by recess continuous improvement of safety, which remains a primary concern in this area of transport, where accidents continue to cause significant damage, and cause a large number of victims. The control of risks of rail transport implies firstly the identification and prediction of risk, and secondly, reducing these risks by acting on ways to decrease their occurrence, their severity, mitigating their consequences by means of avoidance and protection against risks. In this context, the present work of this thesis is to develop an assessment tool and risk analysis at Level Crossings of the Moroccan railway network, which has 521 level crossings with about 80% are not guarded, and the railway network of tram in the cities of Rabat/Salé, which extends on 20 km and which its urban integration has not been without effect on the city, because accidents between the tram and road users whether pedestrians or vehicles, continue to occur and recorded about ten accidents per month of varying severity. The risk analysis of these two systems is based primarily on the functional and dysfunctional studies, then secondly on risk modelling by Bayesian Networks. In fact, the Bayesian approach in evaluating dysfunctions and quantification of the risks constitutes an analysis approach allowing taking into account the behavioural and temporal aspects of the system (events related to human factors or equipment, of random events of accidents, uncontrolled consequences of accidents etc. ). The risk model proposed also allows for a risk prediction based on data collected from the past (feedback)
Luang, Aphay Jean Siri. "Quelle confiance pour améliorer la sécurité du système d'information ? Contribution à une modélisation de la sécurité des systèmes d'information socio-techniques." Compiègne, 2004. http://www.theses.fr/2004COMP1527.
Full textInformation security rests on important technical means whose organisational and social insertion is often retumed to the steps of sensitising. Our investigations show that the training of safety forms part of a strategie global training and located. The practice of safety is indexed with a system of constraints, individual and collective objectives sometimes divergent and intentions. Ln comparison with the priorities that the individual builds itself, safety thus takes a variable weight likely to be negotiated at every moment. Safety is thus not a process but a training of installations which the actors and the threats around the apparent but nonexclusive form operate which is the organization. The piloting of safety supposes permanent construction and update of a representation of the regulations of the complex information system. This building work requires to invest the local margins of appropriation by confidence, thus making it possible to make profitable the company richness
Nonju, Samuel Abieboye. "Le Nigéria dans le système de sécurité africaine et internationale." Paris 10, 1991. http://www.theses.fr/1991PA100052.
Full textThe build-up of destructive weapons particularly in the African context by the racist regime of Pretoria whose nuclear ambition remained unchecked, and as well in their international context by the superpowers' accumulation of sophisticated nuclear arsenal in an area of detente, have created a spiral of questions in the minds of Nigerian political leaders whose prescriptions involve : the formulation of strategic objectives and choices to safeguard the territorial integrity and national sovereignty. Nigerian government's identification and analysis of the dangers of an eventual nuclear war and its subsequent after effects have prompted the actual president - General Ibrahim Babangida's famous question with regards to "how Nigeria could match her goals and interests in such an uncertain world dominated by the superpowers. . . And what would be her position in such a world. . . " however, the relative political stability in Nigeria constitutes an indispensable entity upon which the decision makers ought to define concretely national security options compatible to Nigeria and her sister countries interests in the region, thereby creating a "sine-quoi-non" for peace, economic development and regional security. Although nothing in the present study contradicts Nigeria’s political determination to go nuclear, the question is whether this could be interpreted as an end or a continuation of her global politics in the international scene. It follows that in spite of both financial and technological handicaps in an era of detente between the two superpowers, successive Nigerian governments have opted for the acquisition of nuclear weapons for the security of her 155 million people, the territorial integrity and national sovereignty in the year 2000
Books on the topic "Sécurité du système"
Drollet, Solange. Le système polynésien de sécurité sociale. Marseille: Presses universitaires d'Aix-Marseille, 1996.
Find full textLaure, Mandeville, and France Documentation française, eds. Russie: quel système de sécurité?: Les ministères d'autorité. Paris: Documentation française, 1997.
Find full textRouabhi, Mohamed. Le système de sécurité sociale en Algérie: Évolution historique. Alger: El Dar El Othmania, 2010.
Find full textTorjman, Sherri Resin. Le revenu précaire: Le système de pensions d'invalidité au Canada. Downsview, Ont: Institut G. Allan Roeher, 1988.
Find full textEssais sur l'Europe et le système international: Crise, multilatéralisme et sécurité. Paris: Harmattan, 2011.
Find full textMampuya Kanunk'a Tshiabo, writer of preface, ed. Région des Grands Lacs: Dynamique des conflits et système de sécurité collective. Kinshasa: L'Harmattan RDCongo, 2021.
Find full textKGB connexion: Le système Poutine. Paris: Editions Hors commerce, 2004.
Find full textPooter, Hélène de. Le droit international face aux pandémies: Vers un système de sécurité sanitaire collective. Paris: Pedone, 2015.
Find full textBennasar, Matthieu. Plan de continuité d'activité et système d'information: Vers l'entreprise résiliente. Paris: Dunod, 2006.
Find full textStewart, Ron W. Système d'avertissement de l'approche d'un autre train aux passages à niveau. Montréal, Qué: Centre de développement des transports, 2004.
Find full textBook chapters on the topic "Sécurité du système"
Ross, Friso. "Safeguarding the Constitutional Function of the Occupational Pension System." In Steuerung der betrieblichen Altersversorgung in Europa: garantierte Sicherheit? Governance of Occupational Pensions in Europe: Guaranteed Security? Gouvernance des retraites professionnelles en Europe: Sécurité garantie?, 223–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-15731-8_17.
Full textSol, Marion. "Les systèmes de retraite au révélateur de la crise financière : quels enseignements pour les retraites d’entreprise en France ?" In Steuerung der betrieblichen Altersversorgung in Europa: garantierte Sicherheit? Governance of Occupational Pensions in Europe: Guaranteed Security? Gouvernance des retraites professionnelles en Europe: Sécurité garantie?, 271–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-15731-8_20.
Full text"Chapitre 6 - Sécurité et politique alimentaires." In Le système alimentaire mondial, 407–89. Éditions Quæ, 2010. http://dx.doi.org/10.3917/quae.rasto.2010.01.0407.
Full textZHANG, Hanwei, Teddy FURON, Laurent AMSALEG, and Yannis AVRITHIS. "Attaques et défenses de réseaux de neurones profonds : le cas de la classification d’images." In Sécurité multimédia 1, 51–85. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9026.ch2.
Full textLEFÈVRE, Pascal, Philippe CARRÉ, and David ALLEYSSON. "Invisibilité." In Sécurité multimédia 1, 137–69. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9026.ch4.
Full textFavez, Nicolas. "Chapitre 9. Le système de sécurité émotionnelle." In L'examen clinique de la famille, 247–73. Mardaga, 2020. http://dx.doi.org/10.3917/mard.favez.2020.01.0247.
Full textMENDIBOURE, Léo, Mohamed Aymen CHALOUF, and Francine KRIEF. "Vers de nouvelles architectures intelligentes pour l’Internet des véhicules." In Gestion et contrôle intelligents des réseaux, 205–29. ISTE Group, 2020. http://dx.doi.org/10.51926/iste.9008.ch8.
Full text"Le contrôle d’accès et la sécurité du système d’exploitation." In La sécurité logicielle: une approche défensive, 235–54. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.10.
Full textCHABRIDON, Vincent, Mathieu BALESDENT, Guillaume PERRIN, Jérôme MORIO, Jean-Marc BOURINET, and Nicolas GAYTON. "Analyse de sensibilité globale ciblée pour la fiabilité en présence d’incertitudes sur les paramètres de distribution." In Ingénierie mécanique en contexte incertain, 255–304. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9010.ch7.
Full textSkogan, Wesley G. "Chapitre 1. Les difficultés de réformer le système policier aux États-Unis." In Réformer la police et la sécurité, 39–57. Odile Jacob, 2004. http://dx.doi.org/10.3917/oj.roche.2004.01.0039.
Full textConference papers on the topic "Sécurité du système"
Delatour, G., P. Laclémence, D. Calcei, and C. Mazri. "Système de gestion de la sécurité : quel espace critique pour la décision d’anticipation ?" In Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56122.
Full textGaufreteau, P., and G. Farizon. "Sécurité globale des fonctions de signalisation d’un tramway incluant le système technique et les opérateurs." In Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56128.
Full textLe Baut-Ferrarese, Bernadette. "La transition énergétique : enjeux juridiques. Partie 1 : La transition énergétique à l'épreuve du droit." In MOlecules and Materials for the ENergy of TOMorrow. MSH Paris-Saclay Éditions, 2021. http://dx.doi.org/10.52983/npyt7969.
Full textPerinet, R., and N. Taib. "Prendre en compte les facteurs humains et organisationnels dans la conception d’un système de sécurité interactif innovant." In Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56223.
Full textBrissaud, Florent, and Didier Turcinovic. "Sécurité fonctionnelle des systèmes relatifs à la sécurité : 10 erreurs à éviter." In Congrès Lambda Mu 20 de Maîtrise des Risques et de Sûreté de Fonctionnement, 11-13 Octobre 2016, Saint Malo, France. IMdR, 2016. http://dx.doi.org/10.4267/2042/61703.
Full textBoulanger, J.-L., and L. Zhao. "Sécurité, confidentialité et intégrité dans les systèmes ferroviaires." In Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56197.
Full textMussat, L., and D. Sabatier. "Modélisation et preuve de sécurité des systèmes du transport ferroviaire." In Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56145.
Full textHoudebine, Jean-Claude, Anne Flori, Gilbert Durand, and Hervé Fargetton. "Sûreté de fonctionnement, sécurité des systèmes d'information et survivabilité des systèmes de systèmes." In Congrès Lambda Mu 20 de Maîtrise des Risques et de Sûreté de Fonctionnement, 11-13 Octobre 2016, Saint Malo, France. IMdR, 2016. http://dx.doi.org/10.4267/2042/61698.
Full textSignoret, J.-P., and R. Ostebo. "Norme ISO TR 12489 : modélisation et calcul fiabilistes des systèmes de sécurité." In Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56238.
Full textCaire, J. "Vers un cycle de vie de sécurité globale pour les systèmes informatiques industriels." In Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56195.
Full textReports on the topic "Sécurité du système"
Marsden, Eric, Romuald Perinet, and Jean Pariès. Articulation des sphères réglées et gérées de la sécurité industrielle. Fondation pour une Culture de Sécurité Industrielle, May 2024. http://dx.doi.org/10.57071/rgr871.
Full textCuvelier, Lucie. Agir face aux risques, regard de l’ergonomie. Fondation pour une culture de sécurité industrielle, May 2016. http://dx.doi.org/10.57071/332rge.
Full textTea, Céline. REX et données subjectives: quel système d'information pour la gestion des risques? Fondation pour une culture de sécurité industrielle, April 2012. http://dx.doi.org/10.57071/170rex.
Full textRigaud, Éric. Résilience et management de la sécurité: pistes pour l’innovation en sécurité industrielle. Fondation pour une culture de sécurité industrielle, September 2011. http://dx.doi.org/10.57071/469rig.
Full textKamaté, Caroline. Le monde change, la sécurité industrielle aussi: Humain, numérique, nouvelles organisations: 10 points-clés à l’horizon 2040. Fondation pour une culture de sécurité industrielle, May 2023. http://dx.doi.org/10.57071/240dpc.
Full textFlandin, Simon, Germain Poizat, and Romuald Perinet. Proactivité et réactivité: deux orientations pour concevoir des dispositifs visant le développement de la sécurité industrielle par la formation. Fondation pour une culture de sécurité industrielle, February 2021. http://dx.doi.org/10.57071/948rpn.
Full textRohwerder, Brigitte. Soutien équitable pour les moyens de subsistance et la nourriture. Institute of Development Studies, November 2023. http://dx.doi.org/10.19088/core.2023.010.
Full text