Dissertations / Theses on the topic 'Sécurité du système'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Sécurité du système.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Dhifallah, Mohamed Kamel. "Le système de sécurité sociale en Tunisie au regard du système de Sécurité Sociale en France." Bordeaux 1, 1995. http://www.theses.fr/1995BOR1D006.
Full textWe are going to make a comparaison between the french health care system and the tunisian health care system so as to analyse the latter. The social legislationn in tunisia, influenced by the french legislation came into existence carly in tunisia under the protectorat regime. But once the country became independent, the tunisian system was unable to follow the breaking off between the two systems. However, this did not prevent the instauration of a cooperation between the two sytems. Indeed, the health care general convention signed by both countries in 1965, is a good means of cooperation. In spite of the economic crisis striking the two countries, the two systemes should keep this degree of cooperation and try to improve it if possible. The exemple of the french-european cooperation as far as social security is concerned is to be followed
Dhifallah, Mohamed Kamel. "Le système de sécurité sociale en Tunisie au regard du système de Sécurité Sociale en France." Bordeaux 1, 1995. http://www.theses.fr/1995BOR40006.
Full textWe are going to make a comparaison between the french health care system and the tunisian health care system so as to analyse the latter. The social legislationn in tunisia, influenced by the french legislation came into existence carly in tunisia under the protectorat regime. But once the country became independent, the tunisian system was unable to follow the breaking off between the two systems. However, this did not prevent the instauration of a cooperation between the two sytems. Indeed, the health care general convention signed by both countries in 1965, is a good means of cooperation. In spite of the economic crisis striking the two countries, the two systemes should keep this degree of cooperation and try to improve it if possible. The exemple of the french-european cooperation as far as social security is concerned is to be followed
Dagorn, Nathalie. "Management de la sécurité de l'information : mise en oeuvre, évaluation et pilotage de la sécurité de l'information dans les organisations." Thesis, Nancy 2, 2011. http://www.theses.fr/2011NAN22006.
Full textThis thesis addresses the problem of information security management within organizations. Through a series of theoretical and empirical analyses, it proposes (i) an exploratory model of the engagement of organizations in the governance of information security based on the Unified Theory of Acceptance and Use of Technology by Venkatesh et al. (2003), (ii) a quantitative decision model for evaluation and forecasting of information security based on game theory by Von Neumann and Morgenstern (1944) in its stochastic version formalized by Shapley (1953), and (iii) a model of balanced scorecard using the original method of Kaplan and Norton (1992) for performance measurement and management of information security. Various methodological approaches have been applied to test these proposals, including a questionnaire survey (120 respondents), a brainstorming with votes (68 participants), an in-depth case study, two ex post analyses of fifteen security projects, a Metaplan session (32 participants), and a longitudinal case study. Our research results in an undeniable advance in traditional management models for information security, made possible by the use of interdisciplinary theoretical and methodological bases. In practice, the research provides the decision maker with a comprehensive framework for the management of information security, enabling him to engage the organization knowingly in the process, to evaluate its security status and establish forecasts or comparisons, to control and continuously improve the management of information security within the organization, and ultimately to contribute to the organization's overall performance and competitiveness
Goudalo, Wilson. "Vers une ingénierie avancée de la sécurité des systèmes d'information d'entreprise : une approche conjointe de la sécurité, de l'utilisabilité et de la résilience dans les systèmes sociotechniques." Thesis, Valenciennes, 2017. http://www.theses.fr/2017VALE0026/document.
Full textIn our era of the service industry, information systems play a prominent role. They even hold a vital position for businesses, organizations and individuals. Information systems are confronted with new security threats on an ongoing basis; these threats become more and more sophisticated and of different natures. In this context, it is important to prevent attackers from achieving their results, to manage the inevitable flaws, and to minimize their impacts. Security practices must be carried out within an engineering framework; Security engineering needs to be improved. To do this, it is proposed to develop systemic approaches, innovative on wide spectra and that work on several axes together, improving the user experience. Our goal is to jointly track down and resolve issues of security, usability and resiliency in enterprise information systems. In this doctoral thesis, we position sociotechnical systems in relation to the information systems of companies and organizations. We address paradigms of sociotechnical systems and refocus on the correlations between security, usability and resilience. A case study illustrates the proposed approach. It presents the development of design patterns to improve the user experience. The thesis concludes with an overall discussion of the approach, as well as research perspectives
Millon, Etienne. "Analyse de sécurité de logiciels système par typage statique." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2014. http://tel.archives-ouvertes.fr/tel-01067475.
Full textMillon, Etienne. "Analyse de sécurité de logiciels système par typage statique." Electronic Thesis or Diss., Paris 6, 2014. http://www.theses.fr/2014PA066120.
Full textOperating system kernels need to manipulate data that comes from user programs through system calls. If it is done in an incautious manner, a security vulnerability known as the Confused Deputy Problem can lead to information disclosure or privilege escalation. The goal of this thesis is to use static typing to detect the dangerous uses of pointers that are controlled by userspace. Most operating systems are written in the C language. We start by isolating Safespeak, a safe subset of it. Its operational semantics as well as a type system are described, and the classic properties of type safety are established. Memory states are manipulated using bidirectional lenses, which can encode partial updates to states and variables. A first analysis is described, that identifies integers used as bitmasks, which are a common source of bugs in C programs. Then, we add to Safespeak the notion of pointers coming from userspace. This breaks type safety, but it is possible to get it back by assigning a different type to the pointers that are controlled by userspace. This distinction forces their dereferencing to be done in a controlled fashion. This technique makes it possible to detect two bugs in the Linux kernel: the first one is in a video driver for an AMD video card, and the second one in the ptrace system call for the Blackfin architecture
Guts, Nataliya. "Auditabilité pour les protocoles de sécurité." Paris 7, 2011. http://www.theses.fr/2011PA077004.
Full textSecurity protocols often log some data available at runtime for an eventual a posteriori analysis, called audit. In practice, audit procedures remain informal, and the choice of log contents is left to the programmer's common sense. The goal of this dissertation is to formalize and verify the properties expected from audit ! logs. First we consider the use of logs in so called optimistic security protocols which, as opposed to classic security protocols, rely on the logs to postpone certain security checks until the end of execution. We formally study two optimistic schemes: value commitment scheme and offline e-cash; using process languages techniques, we prove that the information logged by their implementations suffices to detect the cheat of participants, if any. Then we define auditability as the ability of a protocol to collect enough evidence to convince an audit ! procedure (judge). We propose a method based on types with logical refinements to verify auditability, and ; implement it as an extension to an existing typechecker. We show that verifying auditability boils down to typechecking the protocol implementation. We also implement logical support for generic pre- and post-! conditions to enhance modular typechecking of higher-order functions
Bouchiba, Anass. "Evaluation de dysfonctionnement d'un système par approche bayesienne : cas du système ferroviaire." Angers, 2013. http://tel.archives-ouvertes.fr/tel-00842756.
Full textThe development of railway in urban and non urban, is accompanied by recess continuous improvement of safety, which remains a primary concern in this area of transport, where accidents continue to cause significant damage, and cause a large number of victims. The control of risks of rail transport implies firstly the identification and prediction of risk, and secondly, reducing these risks by acting on ways to decrease their occurrence, their severity, mitigating their consequences by means of avoidance and protection against risks. In this context, the present work of this thesis is to develop an assessment tool and risk analysis at Level Crossings of the Moroccan railway network, which has 521 level crossings with about 80% are not guarded, and the railway network of tram in the cities of Rabat/Salé, which extends on 20 km and which its urban integration has not been without effect on the city, because accidents between the tram and road users whether pedestrians or vehicles, continue to occur and recorded about ten accidents per month of varying severity. The risk analysis of these two systems is based primarily on the functional and dysfunctional studies, then secondly on risk modelling by Bayesian Networks. In fact, the Bayesian approach in evaluating dysfunctions and quantification of the risks constitutes an analysis approach allowing taking into account the behavioural and temporal aspects of the system (events related to human factors or equipment, of random events of accidents, uncontrolled consequences of accidents etc. ). The risk model proposed also allows for a risk prediction based on data collected from the past (feedback)
Luang, Aphay Jean Siri. "Quelle confiance pour améliorer la sécurité du système d'information ? Contribution à une modélisation de la sécurité des systèmes d'information socio-techniques." Compiègne, 2004. http://www.theses.fr/2004COMP1527.
Full textInformation security rests on important technical means whose organisational and social insertion is often retumed to the steps of sensitising. Our investigations show that the training of safety forms part of a strategie global training and located. The practice of safety is indexed with a system of constraints, individual and collective objectives sometimes divergent and intentions. Ln comparison with the priorities that the individual builds itself, safety thus takes a variable weight likely to be negotiated at every moment. Safety is thus not a process but a training of installations which the actors and the threats around the apparent but nonexclusive form operate which is the organization. The piloting of safety supposes permanent construction and update of a representation of the regulations of the complex information system. This building work requires to invest the local margins of appropriation by confidence, thus making it possible to make profitable the company richness
Nonju, Samuel Abieboye. "Le Nigéria dans le système de sécurité africaine et internationale." Paris 10, 1991. http://www.theses.fr/1991PA100052.
Full textThe build-up of destructive weapons particularly in the African context by the racist regime of Pretoria whose nuclear ambition remained unchecked, and as well in their international context by the superpowers' accumulation of sophisticated nuclear arsenal in an area of detente, have created a spiral of questions in the minds of Nigerian political leaders whose prescriptions involve : the formulation of strategic objectives and choices to safeguard the territorial integrity and national sovereignty. Nigerian government's identification and analysis of the dangers of an eventual nuclear war and its subsequent after effects have prompted the actual president - General Ibrahim Babangida's famous question with regards to "how Nigeria could match her goals and interests in such an uncertain world dominated by the superpowers. . . And what would be her position in such a world. . . " however, the relative political stability in Nigeria constitutes an indispensable entity upon which the decision makers ought to define concretely national security options compatible to Nigeria and her sister countries interests in the region, thereby creating a "sine-quoi-non" for peace, economic development and regional security. Although nothing in the present study contradicts Nigeria’s political determination to go nuclear, the question is whether this could be interpreted as an end or a continuation of her global politics in the international scene. It follows that in spite of both financial and technological handicaps in an era of detente between the two superpowers, successive Nigerian governments have opted for the acquisition of nuclear weapons for the security of her 155 million people, the territorial integrity and national sovereignty in the year 2000
Backidi, Médard Désiré. "Les prestations familiales dans le système congolais de sécurité sociale." Poitiers, 1992. http://www.theses.fr/1992POIT3009.
Full textThe creation of the framework of family allowances in the congo results in the application of the provisionss of art. 237) of the code of labour in overseas territorier of 1952 which states out : "the heads of territories are entrusted to issue decisions. . . Granting family endowments for all workers submitted to the current code and financial compensation institutions to enable the payment of the allowances". The importance of dependent children urges to wonder about the impact of allowances granted to heads of families and upon the conditions required to be a mong the beneficiaries. Have family allowances improved the social conditions of heads of families ? did they result in inereasing purchasing power ? what are the processes of payment ? we have attempted to answer all these questions trough an analysis of the congolese system of social security in 2 parts : 1 - the framework of familly allowances. 2 - the funding of family allowances. Part on brings out the beneficiaries along with the various allowances granted. This clearly enables the conditions required for the allotment and what allowances are all about. In part two, the survey is about the funding sources, then, it brings out all issues related to the collection of reccipts
Bourgeois, Aline. "Les sanctions répressives dans le système français de Sécurité Sociale." Bordeaux 4, 2010. http://www.theses.fr/2010BOR40062.
Full textAlthough repressive sanctions exist in all the branches of law, they mainly conjure up a vague concept part of the legal standards one easily has an idea of without actually being able to provide a precise definition. Doctrine agrees to consider that such a sanction is a measure characterized by a punitive intention designed to repress a faulty behaviour. Because they have been, for a long time, regarded as ascribed to the judge, it's only around thirty years ago, that repressive sanctions have benefited from specific rules. To be more accurate, the Constitutional Council has extended the warranties granted to the person subject to trial because of penal proceedings, to all the sanctions withn a punitive nature, even to those delivered by a non jurisdictional authority. Consequently, the proposed study offers a dual interest : on the one hand, it illustrates the diversity of repressive sanctions specific to the french social security system and the difficulty to identify the repressive purpose of many of them ; on the other hand, the determination of the repressive sanctions affords their confrontation to the rules of the sanctions of punitive nature which points out that efforts are still necessary to the person taken to court the application of a just and justified sanction and to allow (her) to exercise a protest recourse in the total respect of his (her) rights
Cunty, Claire. "Système d'information géographique et sécurité : une application pour la RATP." Phd thesis, Université Panthéon-Sorbonne - Paris I, 2004. http://tel.archives-ouvertes.fr/tel-00008685.
Full textCunty, Claire. "Système d'information géographique et sécurité : une application pour la RATP." Phd thesis, Paris 1, 2004. http://www.theses.fr/2004PA010529.
Full textHuin, Leslie. "Sécurité d'accès dans les Systèmes d'Information Coopératifs : modélisation et Implémentation à l'aide d'agents." Thesis, Lyon 3, 2012. http://www.theses.fr/2012LYO30028.
Full textSharing heterogeneous and distributed independent data sources can be solved by building a Cooperative Information System (CIS). A CIS is a set of components, exchanging information, expertise and coordinating their activities. This must consider interoperability related to differences of data description and semantic. Data management is provided without using a comprehensive global scheme to respect the autonomy of local databases.In this context, we chose to treat access security in order to ensure confidentiality and data integrity in a cooperation. This adds new security issues regarding heterogeneity and conflict resolution, on top of those in terms of data cooperation. We use two canonical models proposed by the MODEME team, to represent the local schemas and security policies in a unified way.We build a system to manage the interoperation of data and security policies, and the resolution of secure global queries. We have chosen to implement our system using the multi-agent paradigm, with an schema integration and mediation approach. Two protocols have been defined related to the features of the system: - A knowledge management protocol to address the problem of interoperability between different modes of data representation and security models, and to generate the matches between these different models. - A query resolution protocol using the global knowledge, which aims to present the results semantically consistent and secure. Agents are described in their goals, their interactions, their knowledge by defining their role for each protocol, including the key role of security mediator. An experimental scenario illustrates the knowledge generation from local schemas and the development of protocol for access control
Ngueyep, Noumo Florence Chantale. "L'exonération de cotisations de sécurité sociale : entre politique de l'emploi et mutation du système français de sécurité sociale." Bordeaux 4, 2001. http://www.theses.fr/2001BOR40021.
Full textA system for exonerating enterprises of social contributions was tentatively set up in the middle of the seventies in order to help employment. Originally, this was conceived as a one-off answer to what was thought at a time to be a temporary employment crisis due to special circumstances. However, as the unemployment situation persited and wsrsened, the exoneration of social security contributions gradually became a major and steady action in government policies to help boost employment. .
Aljnidi, Mohamad. "Vers un système d'administration de la sécurité pour les réseaux autonomes." Phd thesis, Télécom ParisTech, 2009. http://pastel.archives-ouvertes.fr/pastel-00570696.
Full textBonazza, Pierre. "Système de sécurité biométrique multimodal par imagerie, dédié au contrôle d’accès." Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCK017/document.
Full textResearch of this thesis consists in setting up efficient and light solutions to answer the problems of securing sensitive products. Motivated by a collaboration with various stakeholders within the Nuc-Track project, the development of a biometric security system, possibly multimodal, will lead to a study on various biometric features such as the face, fingerprints and the vascular network. This thesis will focus on an algorithm and architecture matching, with the aim of minimizing the storage size of the learning models while guaranteeing optimal performances. This will allow it to be stored on a personal support, thus respecting privacy standards
Likouka, Ferdinand Sosthène. "Situation et devenir du système de protection sociale au Congo." Bordeaux 4, 1997. http://www.theses.fr/1997BOR40013.
Full textIn the old days, in traditional congolese society, the notion of "individual fate" didn't exist ouside the community: the social needs of the individuals were secured by small entities such as the clan, the village and the family. Belonging to those entities garanteed a certain "security". With the modernization of the congolese society, those entities have broken up and find it more and more difficult, when they live on, to set up actions of "security" intended to protect their members from certain social needs and from the late growing extent of those needs. The modern systems of social security set up to go with the pervert effects of the modernization and growing "salarization" of the economy in the fifties could not enswe most of the population the right to social security. On the contrary, the personal field of application of the current mechanics of social protection remains in the favour of the salaried workers, that is to say the very ones who, due to their security of employment and income, can appear as priviledged. The complaints of the excluded population, longing for better living, working and health conditions, meet the inability for the state to bring out sufficient means, since the process of development of the country makes unsatisfied needs appear simultaneously and everywhere: unemployment, housing, health, education etc. . . Consequently, one has to imagine other forms of social protection or to relax the current mechanics of social security so that they can integrate other categories of the population (indepent workers among others). As for the paupers,the mecanics of social insurance seen to be the only ones adapted to their social welfare nowadays. If it is so, to what extent will this social welfare grow given that, on the one hand, the paupers sand for the major category of the country and that, on the other hand, the welfare state is falling off day after day? Obviously, the future of the congolese system of social protection is quite incertain
Sun, Pengfei. "Ingénierie de modèle pour la sécurité des systèmes critiques ferroviaires." Thesis, Ecole centrale de Lille, 2015. http://www.theses.fr/2015ECLI0018/document.
Full textDevelopment and application of formal languages are a long-standing challenge within the computer science domain. One particular challenge is the acceptance of industry. This thesis presents some model-based methodologies for modelling and verification of the French railway interlocking systems (RIS). The first issue is the modellization of interlocking system by coloured Petri nets (CPNs). A generic and compact modelling framework is introduced, in which the interlocking rules are modelled in a hierarchical structure while the railway layout is modelled in a geographical perspective. Then, a modelling pattern is presented, which is a parameterized model respecting the French national rules. It is a reusable solution that can be applied in different stations. Then, an event-based concept is brought into the modelling process of low-level part of RIS to better describe internal interactions of relay-based logic. The second issue is the transformation of coloured Petri nets into B machines, which can help designers on the way from analysis to implementation. Firstly, a detailed mapping methodology from non-hierarchical CPNs to abstract B machine notations is presented. Then the hierarchy and the transition priority of CPNs are successively integrated into the mapping process, in order to enrich the adaptability of the transformation. This transformation is compatible with various types of colour sets and the transformed B machines can be automatically proved by Atelier B. All these works at different levels contribute towards a global safe analysis framework
Sbiaa, Fatma. "Modélisation et analyse de la sécurité au niveau système des primitives cryptographique." Thesis, Lorient, 2016. http://www.theses.fr/2016LORIS410.
Full textRegarding the increasing complexity of cryptographic devices, testing their security level against existing attacks requires a fast simulation environment. The Advanced Encryption Standard (AES) is widely used in embedded systems in order to secure the sensitive data. Still, some issues lie in the used key and the S-BOX. The present work presents a SystemC implementation of a chaos-based crypto-processor for the AES algorithm.The design of the proposed architecture is studied using the SystemC tools. The proposed correction approach exploits the chaos theory properties to cope with the defaulting parameters of the AES algorithm. Detailed experimental results are given in order to evaluate the security level and the performance criteria. In fact, the proposed crypto- system presents numerous interesting features, including a high security level, a pixel distributing uniformity, a sufficiently large key-space with improved key sensitivity, and acceptable speed
Abdelkrim, Malika. "Évolution de la famille marocaine et insertion du système de sécurité sociale." Paris 4, 1987. http://www.theses.fr/1987PA040337.
Full textThe study is an attempt to analyse the developement of the broad moroccan family facing the development of the moroccan social security system. Its scope covers two levels : one is limited to family, the other deals with the insertion and role of social security in moroccan society. The traditional society, set up on the broadened family, ensured security for its members, it is gradually replaced by a "modern" society, set up on the reduced family, a society which at the moment does not adequately ensure the security formerly offered by the traditional family. The institution of a social security system introduced under the french protectorate as a substitute to the traditional solidarity is maintained under the independence. However, this system has a clearly restrictive conception. The review of the social protection system according to the different types of family (traditional modern and rural urban) highlights the causes of the feeble insertion of the social security in the moroccan society
Muzeau, Julien. "Système de vision pour la sécurité des personnes sur les remontées mécaniques." Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALT075.
Full textWith the increase in the number of visitors in mountain ranges and the multiplication of accidents on skilifts attributed to human behavior, safety has become a major issue for resort managers.To fight this phenomenon, the start-up from Grenoble Bluecime developed a computer vision system, named SIVAO, which is able to detect a hazardous situation at the boarding of a skilift. The operation of the system breaks down into three steps. First, the chair (or vehicle) is detected in the image. Then, the presence of passengers is confirmed or invalidated. Finally, the position of the security railing is determined. If passengers are present on the vehicle and if the security railing is not down, then the situation is considered as hazardous. In that case, an alarm is triggered, in order to inform the skiers or the operator who can slow down the skilift to secure the vehicle.Despite convincing results, numerous difficulties have to be overcome by SIVAO: various variabilities (vehicle size, boarding orientation, meteorological conditions, number of passengers), camera vibration, complex configuration in the context of a new plant, etc.The MIVAO project, in partnership with the Hubert Curien laboratory, the Bluecime start-up and the Sofival company, was born in order to overcome the previous challenges. The goal is to build an artificial intelligence able to detect, even anticipate, a hazardous situation on vehicles of a skilift, in order to guarantee the security of passengers. Within this project, the general goal of the Gipsa-lab is the automatic annotation, in the least supervised way possible, of chairlift videos.Firstly, we present a classification method whose aim is to confirm or invalidate the presence of passengers on each vehicle. In fact, this preliminary information is critical for the analysis of a potential danger. The proposed technique is based on hand-made features which have a physical interpretation. We show that, by including a priori knowledge, the obtained results are comptetitive against those from complex neural networks, allowing real-time functioning as well.Then, we detail a process for passenger counting on each vehicle in the most unsupervised way possible. This pipeline consists in a dimensionality reduction step followed by a data clustering stage. The latter aims, in the context of our project, at gathering tracks whose vehicles carry the same number of passengers. One can then deduce, from a small number of labels obtained by hand, the number of people present during each track. In particular, we detail two algorithms developed during this thesis. The first one proposes a generalisation of the density-based clustering method DBSCAN, via the introduction of the concept of ellipsoidal neighborhood. The second conciliates Gaussian mixture and spectral clusterings so as to discover non-convex data groups.Finally, we address the problem of automatic extraction of vehicles from camera images, as well as the modeling of their trajectory. To do this, we propose a first method which consists in removing the noise from the optical flow by means of the optical strain. We also present a technique for automatically determining the duration of a vehicle track via frequency analysis.Moreover, we detail an annotation work whose objective is to define clipping paths, pixel by pixel, over the passengers and vehicles in sequences of fourty consecutive images
Maymont, Anthony. "La liberté contractuelle du banquier : réflexions sur la sécurité du système financier." Thesis, Clermont-Ferrand 1, 2013. http://www.theses.fr/2013CLF10425.
Full textThe contractual freedom of the banker is a freedom among the others. However, it is the most sensitive in so faras it can affect on his activity. Apparently unlimited today, this freedom would have even undeniableconsequences on the safety of the financial system by facilitating the phenomenon of “speculative bubbles”. Thecontract, situated in the heart of the banking and financial activity, would be thus the cause of this reality. Therecent shocks, such as financial crises, require the detailed examination of the national but also internationalbank transactions, especially the most dangerous. Still ignored, the measurement of the contractual freedom ofthe banker proves to be necessary to propose a review. The aim is not thus to rule any banker’s freedom out butto define the degree of contractual freedom to grant to him for each transaction. The idea being to grant him asatisfactory level of freedom while ensuring the safety of financial system. The stake rests finally on theconciliation of the contractual requirement, resulting from the contractual freedom of the banker, with the safetyrequirement of the financial system, necessary for the sustainability of banks and worldwide economy
Asselin, Eric. "Système de détection d'intrusion adapté au système de communication aéronautique ACARS." Thesis, Toulouse, INPT, 2017. http://www.theses.fr/2017INPT0058.
Full textModern civil aviation is increasingly dependent on the interconnection of all players, be it aircraft manufacturers, air traffic controllers, pilots, crew members or airlines. In recent years, much work has been done to propose methods to simplify the task of pilots, to better control and optimize airspace, to facilitate the management of flights by airlines and to optimize the maintenance tasks between flights. In addition, airlines are seeking not only to provide more demanding passengers with entertainment, messaging and web browsing services, but also Internet connection services for their own devices. This omnipresence of connectivity in the aeronautical field has paved the way for a new set of cyber threats. The industry must therefore be able to deploy security mechanisms inline with safety requirements while allowing the many functional needs of all actors. Despite this, there are few solutions for intrusion detection and analysis on avionics systems. The complexity of updates on such a system makes it difficult to use strictly signature-based mechanisms, so it is desirable that more "smart" mechanisms, threats evolution proof, be developed and deployed. This thesis is part of an approach to put in place security mechanisms for communications between the ground and the airplane, and more particularly an intrusion detection system for the aeronautical communication system ACARS to protect the Air Traffic Control (ATC) and Aeronautical Operational Control (AOC) functions. Based on anomaly detection technique, a first proposed model makes it possible to discriminate the abnormal ACARS messages using a technique borrowed from the text classification, n-grams. A second proposed model, also based on anomaly detection technique, allows to model a sequence of messages, using Markov chains, exchanged between the ground and the airplane during a flight, allowing to detect messages not taking part of a normal communication. The last contribution consists of an alternative to the ROC curve to evaluate the performance of an intrusion detection system when the available data set contains only normal instances
El, Jamal Mohamad Hani. "Contribution à l'évolution des exigences et son impact sur la sécurité." Phd thesis, Université Paul Sabatier - Toulouse III, 2006. http://tel.archives-ouvertes.fr/tel-00139543.
Full textBriffaut, Jérémy. "Formalisation et garantie de propriétés de sécurité système : application à la détection d'intrusions." Phd thesis, Université d'Orléans, 2007. http://tel.archives-ouvertes.fr/tel-00261613.
Full textNous proposons tout d'abord un langage de description des activités système servant de base à la définition d'un ensemble de propriétés de sécurité.
Ce langage repose sur une notion de dépendance causale entre appels système et sur des opérateurs de corrélation.
Grâce à ce langage, nous pouvons définir toutes les propriétés de sécurité système classiquement rencontrées dans la littérature, étendre ces propriétés et en proposer de nouvelles.
Afin de garantir le respect de ces propriétés, une implantation de ce langage est présentée.
Nous prouvons que cette implantation capture toutes les dépendances perceptibles par un système.
Cette méthode permet ainsi d'énumérer l'ensemble des violations possibles des propriétés modélisables par notre langage.
Notre solution exploite la définition d'une politique de contrôle d'accès afin de calculer différents graphes.
Ces graphes contiennent les terminaux du langage et permettent de garantir le respect des propriétés exprimables.
Nous utilisons alors cette méthode pour fournir un système de détection d'intrusion qui détecte les violations effectives des propriétés.
L'outil peut réutiliser les politiques de contrôle d'accès disponibles pour différents systèmes cibles DAC (Windows, Linux) ou MAC tels que SELinux et grsecurity.
Cet outil a été expérimenté sur un pot de miel durant plusieurs mois et permet de détecter les violations des propriétés souhaitées.
Pooter, Hélène de. "Le droit international face aux pandémies : vers un système de sécurité sanitaire collective ?" Thesis, Paris 1, 2013. http://www.theses.fr/2013PA010343.
Full textIn the face of pandemics, is international law organized as a "system of collective health security" (foregoing excessive unilateral measures - guaranteed by the community through joint action - upholding State rights to adopt necessary individual measures)? The study of instruments adopted by the WHO (International Health Regulations, Pandemic Influenza Preparedness Framework), of unilateral acts of the UN (resolutions of the General Assembly, the Security Council and the Economic and Social Council), of cooperation between international organizations and of the WTO's Agreements (GATT, SPS Agreement and TRIPS Agreement) reveals that the answer to each segment of the question is positive. However, one cannot ignore the highly imperfect result of the fight against pandemics. If there are undeniable indices which illustrate the existence of a nascent system of collective health security, international law in the face of pandemics is nevertheless thus far characterized by an agglomerate of fragments at odds with a coherent legal edifice
Blanc, Pascal. "Pilotage par approche holonique d'un système de production de vitres de sécurité feuilletées." Nantes, 2006. http://www.theses.fr/2006NANT2126.
Full textIn an everyday more competitive environment, firms constantly need to adapt and optimise their industrial tools, to increase their competitiveness. In particular, the control of manufacturing systems is evaluated in terms of cost and time parameters, which contribute to assess the return, and so the competitiveness of a firm. The increasing needs for flexibility, agility and efficiency result in a growing complexity of manufacturing systems and a necessity of integration of their control. These requirements are illustrated by an industrial case which is proposed as an example for manufacturing system control design. Within this manufacturing control system, problems are identified as scheduling and/or optimisation problems, for which dynamic data are numerous and miscellaneous and are constantly updated. In this dissertation, we illustrate the use of a holonic structure to perform the control of such an industrial manufacturing system. Such a structure makes possible to consider a reality left out by many other approaches: the hierarchical and heterarchical nature of decision-making within manufacturing systems, as well as the physical reality of these systems. Thus, the use of a holonic structure allows for building a reactive and configurable control, while considering global aspects of the manufacturing system. The use of the PROSA architecture is based on a typology of the manufacturing system elements: products, resources, orders and specialised decision-making centres (hierarchical and/or functional). It allows us to identify and define the roles and behaviours of the manufacturing control elements. For this architecture, we propose the use of mechanisms to synchronize the execution of manufacturing orders. These mechanisms guarantee the availability of components and enable to impose limit time constraints on task scheduling. On the other hand, we propose a typology of Resource holons, based on characteristics of the tasks that they perform: supply, conversion, assembly or disassembly. For each type of Resource holon, specific heuristics are used to solve the tasks scheduling problem, taking into account the own model of each one. For instance, a specific heuristic generates a solution to the scheduling/packing problem in the case of a raw material cutting machine. These mechanisms and algorithms are implemented within a multi-agents system, which supports the development of the manufacturing control system. To evaluate this manufacturing control, the use of discrete-event simulation is proposed as an emulator of the physical system. This proposition makes possible to solve problems of redundancy during the development of manufacturing control, permits to reuse objects of the simulation model, and allows some savings in the development effort, since the manufacturing execution system evaluated is the same as the one used in the real context. Finally, this manufacturing execution system (MES) is integrated to the management system of the firm, as it interfaces the enterprise resource planning (ERP), and the physical system
Briffaut, Jérémy. "Formation et garantie de propriétés de sécurité système : application à la détection d'intrusions." Orléans, 2007. http://www.theses.fr/2007ORLE2053.
Full textBentebibel, Rim. "Raisonnement à partir de Cas Textuel pour la sécurité routière : Le système SAARA." Paris 5, 2008. http://www.theses.fr/2008PA05S005.
Full textOwaye, Jean-François. "Système de défense et de sécurité du Gabon de 1960 à nos jours." Montpellier 3, 1997. http://www.theses.fr/1997MON30022.
Full textGabon's "security and defense system" was established in 1960, resulting from the fervour of independance and to the transfer of expertise from the community to the new african sovereignties. It is "a unification of civil and military equipment, of operational methods and rules", undoubtedly inspired by the conventional french military model, but which also takes into account the local ecology, the international geostrategic environment and the socio-economic development of the country. Set up by the french military command,the system is based on one of the principal objectives of gabon's general policy : security / development, which limits the defense efforts to a strict minimum (2,5% of the g. N. P. ), while assuring the nation (thanks to the strategy of dissuasion ) a relative security. Since 1960 it has come a long way. In fact, the security forces, inexperienced and understaffed when founded, were confined to the simple inaugural funetion af the new sovereignty ; their social role was nevertheless essential : they compensated for the lach of education by substituting for civil engineers. They were the "agents" of socialisation and national integration towards which the military service and youth civic service strove. Since the seventies, the improvement of a military ressources and the status of the personnel, the " gabonisation " of the command, the territorialisation of the armed forces and their professionalisation. . . Shows a permanent change in the defense system ; anadaptation characteristic of the search for a more efficient defense system, which remans the most important factor of the materialisation of the social treaty, and thus of the stability of the country
Jin, Gan. "Système de traduction automatique français-chinois dans le domaine de la sécurité globale." Thesis, Besançon, 2015. http://www.theses.fr/2015BESA1006.
Full textIn this paper, in addition to our research results for a French-Chinese machine translation system, we present the theoretical contributions from the SyGULAC theory and from the micro-systemic theory with its calculations as well as the methodologies developed aimed at a secure and reliable application in the context of machine translation. The application covers critical safety areas such as aerospace, medicine and civil security.After presenting the state of the art in the field of machine translation in China and France, the reasons of the choice of the micro-systemic theory and SyGULAC theory are explained. Then, we explain the problems encountered during our research. The ambiguity, which is the major obstacle to the understandability and to the translatability of a text, is present at all language levels: syntactic, morphological, lexical, nominal and verbal. The identification of the units of a sentence is also a preliminary step for global understanding, whether for human beings or for a translation system. We present an inventory of the divergences between the french and the chinese language in order to achieve an machine translation system. We try to observe the verbal, nominal and vocabulary structure levels, in order to understand their interconnections and their interactions. We also define the obstacles to this research, with a theoretical point of view but also by studying our corpus.The chosen formalism starts from a thorough study of the language used in security protocols. A language is suitable for automatic processing only if this language is formalized. Therefore, An analysis of several French/Chinese bilingual corpora, but also monolingual, from civil security agencies, was conducted. The goal is to find out and present the linguistic characteristics (lexical, syntactic ...) which characterize the language of security in general, and to identify all the syntactic structures used by this language. After presenting the formalization of our system, we show the recognition, transfer and generation processes
He, Ruan. "Architectures et mécanismes de sécurité pour l'auto-protection des systèmes pervasifs." Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00579773.
Full textChaou, Samira. "Modélisation et analyse de la sécurité dans un système de stockage pair-à-pair." Phd thesis, Université d'Evry-Val d'Essonne, 2013. http://tel.archives-ouvertes.fr/tel-00877094.
Full textBrézillon, Juliette. "Un système tutoriel intelligent pour l'autoévaluation de comportements utilisateurs : application à la sécurité routière." Paris 6, 2010. http://www.theses.fr/2010PA066149.
Full textSaadi, Rachid. "The Chameleon : un système de sécurité pour utilisateurs nomades en environnements pervasifs et collaboratifs." Lyon, INSA, 2009. http://theses.insa-lyon.fr/publication/2009ISAL0040/these.pdf.
Full textWhile the trust is easy to set up between the known participants of a communication, the evaluation of trust becomes a challenge when confronted with unknown environment. It is more likely to happen that the collaboration in the mobile environment will occur between totally unknown parties. An approach to handle this situation has long been to establish some third parties that certify the identities, roles and/or rights of both participants in a collaboration. In a completely decentralized environment, this option is not sufficient. To decide upon accesses one prefer to rely only on what is presented to him by the other party and by the trust it can establish, directly by knowing the other party or indirectly, and vice-versa. Hence a mobile user must for example present a set of certificates known in advance and the visited site may use these certificates to determine the trust he can have in this user and thus potentially allow an adapted access. In this schema the mobile user must know in advance where she wants to go and what she should present as identifications. This is difficult to achieve in a global environment. Moreover, the user likes to be able to have an evaluation of the site she is visiting to allow limited access to her resources. And finally, an user does not want to bother about the management of her security at fine grain while preserving her privacy. Ideally, the process should be automatized. Our work was lead to define the Chameleon architecture. Thus the nomadic users can behave as chameleons by taking the "colors" of their environments enriching their nomadic accesses. It relies on a new T2D trust model which is characterized by support for the disposition of trust. Each nomadic user is identified by a new morph certification model called X316. The X316 allows to carry out the trust evaluation together with the roles of the participants while allowing to hide some of its elements, preserving the privacy of its users
Kabil, Alexandre. "CyberCOP 3D : visualisation 3D interactive et collaborative de l'état de sécurité d'un système informatique." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0166.
Full textThe aim of this thesis was to study the use of Collaborative Virtual Environments (CVE) for the analysis of the state of security of computer systems, also called Cyber Situational Awareness (CSA). After studying CSA’s models and tools, we have had the opportunity to visit the Security Operations Centers (SOCs) of four industrial partners of the CyberCNI chair, in order to better understand the needs and expectations of cyber analysts. These visits were made as part of a collaborative activity analysis protocol and have allowed us to propose a model, the 3D Cyber-COP. Based on this model and a model of the WannaCry ransomware, we have developed a CVE and a simplified scenario engine that allows users to design their own alert analysis scenarios. We have also performed a usability evaluation of a virtual environment for alert analysis, with a panel of novice users
Dabladji, Mohammed el-Habib. "Vers un système de sécurité semi-actif pour les véhicules à deux-roues motorisés." Thesis, Université Paris-Saclay (ComUE), 2015. http://www.theses.fr/2015SACLE017/document.
Full textRiders of Powered two-wheeled vehicles (P2WV) are among the most vulnerable drivers on roads. In France, riders of P2WVs are just 1.9% of road traffic, but account for 24% of road user deaths. This high rate of mortality may be explained by several factors. One of them is the lack of specific Intelligent Transportation System (ITS). In fact, because of the complexity of the P2WVs dynamics and the unavailability of some states (such as the steering torque, the roll angle and the lateral forces), it is more difficult to design specific ITS systems for P2WVs. In this context, my thesis aims the estimation of relevant dynamics of P2WVs. Firstly, a Takagi-Sugeno (TS) observer is proposed to estimate the lateral dynamics. The observer completely decouples the steering torque - which is considered as an unknown input (UI) - from the estimation error dynamics. Then, to estimate the lateral dynamics and the steering torque, another TS observer is proposed. The observer in question has a proportional derivative (PD) adaptation law to reconstruct the UI. However, in both observers, nonlinearities with respect to tire forces are neglected. To circumvent this difficulty, lateral forces are considered as UIs and they are algebraically estimated thanks to high order sliding mode observers. Finally, we focus on the longitudinal dynamics and propose an UI observer with a PD adaptation law to estimate the longitudinal forces and the thrust and braking torques. Once the lateral and longitudinal dynamics estimated, we were interested by the control of the braking system. In this context, a robust controller is proposed in order to optimize the braking for P2WVs. The controller is based on sliding mode techniques and allows the tracking of the longitudinal slip to a reference one. The latter is computed through a program inspired by MPPT algorithms. Finally, to validate the several observers developed in my thesis, an observer based controller using TS techniques is proposed in order to stabilize and automate an instrumented scooter and to track a reference roll angle
Samadi, Ali Mohammed. "Le système de la protection sociale en Iran." Montpellier 1, 1986. http://www.theses.fr/1986MON10033.
Full textAlthough much effort has been made to develop comprehensive social benefits in developed countries, there is still much to be done in developing nations. In order to understand governement assistance policies in general and in iran in particular, we must define what is to be understood by the term "social benefits". Several political, economic and social phenomena, such as industrialization and the decline of the standard of living of the working class, have been the major factore involved in the creation and development of the social benefits system. In iran, the great disparity of incomes makes it impossible for the underprivileged to save money to cover future misfortunes. This state of affairs has induced the iranian government to provide social benefits, which are seen as indispensable to the economic and social development of the country. Over the past several years, social benefits have broadened in scope to cover an increasing number of risks. However the agricultural sector is still under-insured. The social benefits system in iran now faces several difficulties due to the economic structure of the country. In addition, certain socioeconomic characteristics of iran (illiteracy, high birth rate, insufficient human and health care resources) are hindering the full development of an effective social benefits system. In the contemporary world no social program can live up to its full potential unless its organization and management are adapted to the real conditions and aptitudes of the countries in which such programs are implanted
Jbara, Abdelbasset. "Méthode d'obtention et d'optimisation des principaux paramètres garantissant la sécurité d'une transmission numérique en se fixant l'objectif de sécurité : application aux système de transports." Lille 1, 1993. http://www.theses.fr/1993LIL10060.
Full textGaber, Chrystel. "Sécurisation d'un système de transactions sur terminaux mobiles." Phd thesis, Université de Caen, 2013. http://tel.archives-ouvertes.fr/tel-01009369.
Full textMarconot, Johan. "Fonction Physique Non-clonable pour la Sécurité du Cycle de Vie d'un Objet Cyber-physique." Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALT011.
Full textThe thesis focus on the conception of solutions to secure, all along its lifecycle, the assets and the functions which are embedded into a connected object. The lifecycle induces multiple interactions which expose the assets. Still, each actor may need private access in order to perform technical operations which have to be done. The solution has to securely manage the access requests but also takes account of the fact that most of the connected object are resources constraints system.We provide two main contributions: the analysis of security requirements for the device lifecycle and a new model of extraction circuit for strong digital PUF. The identified configuration for the extraction circuit offer trade-off between the circuit area, the frequency and the security metrics. It allows to conceive an efficient DPUF which could be integrated at fabrication chip, ensuring authentication property and performance requirements for lifecycle
Coulon, Bruno. "Les normes sécuritaires en milieu carcéral français : les théories et les applications : l'adaptation des normes au système carcéral et l'adaptabilité réciproque de ce système." Aix-Marseille 3, 2000. http://www.theses.fr/2000AIX32018.
Full textPorquet, Joël. "Architecture de sécurité dynamique pour systèmes multiprocesseurs intégrés sur puce." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2010. http://tel.archives-ouvertes.fr/tel-00574088.
Full textMagnuszewski, Pierre. "Corps militaires plurinationaux et édification d'un système européen de défense." Université Robert Schuman (Strasbourg) (1971-2008), 2007. http://www.theses.fr/2007STR30009.
Full textSince 1945, Europe has been able to build for peaceful tomorrows and strengthen collective security. Yet it remains an object of desire courted by threats. When the glacial era imposed by the Cold War finally drew to a close, a number of deep geopolitical changes came into operation. The years 1989/1999 were marked by the creation of great multinational units and the unveiling of new partnerships. Europe's powerlessness was to become blatant, however, with the wars in the Gulf and the Balkans. Paradoxically, Europe began as early as 1991/1995 -to acquire a vast amount of experience within alliances whose configurations were uncertain and heterogeneous. Then came 9/11. Europe' enemies suddenly looked different : kamikazes and terrorists supplant the Soviet armoured divisions. War breaks out in Afghanistan and lraq. 2003 marked the turning point : every political defence crisis became a precursor to the EU's misadventures. A great diversity of military alliances has, in fact, always existed. Is it necessary for Europe to bow before the will of a powerful superior ? Today the NRF s waiting for a hypothetical tsunami, a humanitarian mission of a Petersburg type. Is this an ambition for a Europe looking to gain credibility, but resisting calls for financial efforts? Indeed many European countries — some since 1949— are content with the US and NATO which offer greater security. Nevertheless, Europe is trying to build a common defence system. But if there is one field of action where it is essential to pause for reflection — and to keep a critical approach, to anticipate and to avoid mistakes, it is, of course, in the defence policy
Lemerre, Matthieu. "Intégration de systèmes hétérogènes en termes de niveaux de sécurité." Phd thesis, Université Paris Sud - Paris XI, 2009. http://tel.archives-ouvertes.fr/tel-00440329.
Full textTournier, Dominique. "Conception, réalisation et caractérisation d'un composant limiteur de courant commandé en carbure de silicium et son intégration système." Lyon, INSA, 2003. http://theses.insa-lyon.fr/publication/2003ISAL0011/these.pdf.
Full textThe expansion of electricity networks (distribution of energy, telecommunication), in sectors manufacturer or domestics strongly contributed to the increase of the risks of appearance of defects, such as a surge or an overload. This multiplicity and electric complexity of networks, need to have reliable systems and in high return favored the development of devices of protection as serial protection. Because of the strong energy appearing during a short circuit, it is necessary to limit and to dissipate the energy of the short circuit, under high bias. These constraints led to a feasibility study of a current limiter in 4H-SiC, of a nominal current IN = 32 A and a nominal voltage VN = 690 V. A VJFET structure was retained, then optimized by taking into account foreseen characteristics and SiC peculiarities. A first lot of component was made, validating the bidirectional limitation function in both current and tension mode, (VMAX = 970 V). The efficiency of the protection was validated, demonstrating the capacity of a component to react at very weak time (t< 1 microsecond)
Possemato, Andrea. "A Multidimensional Analysis of The Android Security Ecosystem." Electronic Thesis or Diss., Sorbonne université, 2021. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2021SORUS455.pdf.
Full textWith more than 2.5 billion active devices based on Android, Google's mobile operating system is now one of the most widely used in the world.Despite all the efforts made by Google to constantly improve the security of the entire Android ecosystem, there are still several problems that remain unresolved. In this thesis, we analyse in detail some of the open problems that affect different components and players that are part of and contribute to the Android ecosystem. We start with the security analysis of the network communication of Android applications, showing how, even if Android provides several techniques to secure network communications, developers sometimes are still forced to use cleartext protocols. Our study continues with the analysis of another issue that puts the security and privacy of the user at risk. We analyze the vulnerabilities exploited by malicious applications to perform phishing attacks and how there is still no system in place to allow applications to protect themselves against these attacks. Last, we analyze what we think may be the perfect representation of how difficult it is to ensure security in a domain as extensive as Android analyzing how customizations, even though beneficial to vendors, can lead to security problems that are lowering down the overall security of the Android system. In this thesis, for each of the problems, we analyze the issue in detail, we measure how widespread it is, and we propose an alternative solution with the aim of solving the problem, making a step towards a more secure Android ecosystem
Haddi, Zouhair. "Conception et développement d'un système multicapteurs en gaz et en liquide pour la sécurité alimentaire." Thesis, Lyon 1, 2013. http://www.theses.fr/2013LYO10292/document.
Full textElectronic noses and tongues systems based on chemical and electrochemical sensors are an advantageous solution for the characterisation of odours and tastes that are emanating from food products. The cross-selectivity of the sensor array coupled with patter recognition methods is the key element in the design and development of these systems. In this context, we have demonstrated the ability of an electronic nose device to discriminate between different types of drugs, to analyse cheeses freshness, to identify adulterated cheeses and to differentiate between potable and wastewaters. We have also succeeded to correctly classify drinking waters (mineral, natural, sparkling and tap) and wastewaters by using a potentiometric electronic tongue. This study was validated by Gas Chromatography coupled with Mass Spectrometry (GC-MS). Furthermore, we have developed a voltammetric electronic tongue based on a Diamond Doped Boron electrode to differentiate treatment stages of domestic and hospital wastewaters and to identify different heavy metals (Pb, Hg, Cu, Cd, Ni and Zn) contained in Rhône river. The Differential Pulse Anodic Stripping Voltammetry (DPASV) was used as an electrochemical method to characterise the studied waters. Finally, the hybrid multisensor systems have proven to be good analytical tools to characterise the products of food industry such as Tunisian juices and Moroccan olive oils