Academic literature on the topic 'Sécurité et confidentialité'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sécurité et confidentialité.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Sécurité et confidentialité"
Jay, Nicolas, and Marc Koehler. "Sécurité et confidentialité des données de traçabilité en milieu de soins." Interbloc 36, no. 3 (July 2017): 153–56. http://dx.doi.org/10.1016/j.bloc.2017.07.005.
Full textDaho, Grégory, Emmanuel-Pierre Guittet, and Julien Pomarède. "Les territoires du secret : confidentialité et enquête dans les mondes pluriels de la sécurité." Cultures & conflits, no. 118 (December 1, 2020): 7–17. http://dx.doi.org/10.4000/conflits.21827.
Full textDaho, Grégory, Emmanuel-Pierre Guittet, and Julien Pomarède. "Les territoires du secret : confidentialité et enquête dans les mondes pluriels de la sécurité." Cultures & conflits, no. 118 (December 1, 2020): 7–17. http://dx.doi.org/10.4000/conflits.21827.
Full textTesta, Valerie, Alexandria Bennett, Jeffrey Jutai, Zachary Cantor, Peter Burke, James McMahon, R. Nicholas Carleton, et al. "Application du cadre Theoretical Domains Framework pour cerner les préférences des policiers, des pompiers et des ambulanciers en matière d’accès aux soins de santé mentale dans une clinique de traitement des blessures de stress opérationnel pour les premiers répondants : une étude qualitative." Promotion de la santé et prévention des maladies chroniques au Canada 43, no. 10/11 (November 2023): 481–502. http://dx.doi.org/10.24095/hpcdp.43.10/11.02f.
Full textMarsico, G. "Numérique, virtuel, réseaux sociaux, objets connectés : leviers ou freins à la confiance dans la relation de soins ?" Psycho-Oncologie 14, no. 1-2 (March 2020): 53–56. http://dx.doi.org/10.3166/pson-2020-0123.
Full textÖnen, Melek, Francesco Cremonesi, and Marco Lorenzi. "Apprentissage automatique fédéré pour l’IA collaborative dans le secteur de la santé." Revue internationale de droit économique XXXVI, no. 3 (April 21, 2023): 95–113. http://dx.doi.org/10.3917/ride.363.0095.
Full textGusev, Alexander, Arnaud Leconte, and Simone Lucatello. "Green Digital Transition and Data Governance." L'Europe en Formation 396, no. 1 (November 13, 2023): 59–83. http://dx.doi.org/10.3917/eufor.396.0059.
Full textTschudi, Hunziker, Kündig, Lüscher, Freiermuth, Heller, and Heberer. "Internet-Kommunikation zwischen Hausärzten und Universitätsspital." Praxis 91, no. 7 (February 1, 2002): 257–60. http://dx.doi.org/10.1024/0369-8394.91.7.257.
Full textBarry, Bridget, Rosemary Ricciardelli, and Heidi Cramm. "« Nous sommes uniques » : facteurs de stress organisationnels, soutien par les pairs et attitudes à l’égard des soins de santé mentale chez les pompiers d’aéroport." Promotion de la santé et prévention des maladies chroniques au Canada 43, no. 10/11 (November 2023): 503–14. http://dx.doi.org/10.24095/hpcdp.43.10/11.03f.
Full textKalajdzic, Jasminka. "Access to Justice for the Wrongfully Accused in National Security Investigations." Windsor Yearbook of Access to Justice 27, no. 1 (February 1, 2009): 172. http://dx.doi.org/10.22329/wyaj.v27i1.4567.
Full textDissertations / Theses on the topic "Sécurité et confidentialité"
Cherif, Amina. "Sécurité des RFIDs actifs et applications." Thesis, Limoges, 2021. http://www.theses.fr/2021LIMO0015.
Full textOver the 30 last years, active RFID devices have evolved from nodes dedicated to identification to autonomous nodes that, in addition, sense (from environment or other sources) and exchange data. Consequently, the range of their applications has rapidly grown from identification only to monitoring and real time localisation. In recent years, thanks to their advantages, the use of active RFID nodes for mobile data collection has attracted significant attention. However, in most scenarios, these nodes are unattended in an adverse environments, so data must be securely stored and transmitted to prevent attack by active adversaries: even if the nodes are captured, data confidentiality must be ensured. Furthermore, due to the scarce resources available to nodes in terms of energy, storage and/or computation, the used security solution has to be lightweight. This thesis is divided in two parts. In the first, we will study in details the evolution of active RFID nodes and their security. We will then, present, in the second part, a new serverless protocol to enable MDCs (Mobile Data Collectors), such as drones, to collect data from mobile and static Active RFID nodes and then deliver them later to an authorized third party. The whole solution ensures data confidentiality at each step (from the sensing phase, before data collection by the MDC, once data have been collected by MDC, and during final delivery) while fulfilling the lightweight requirements for the resource-limited entities involved. To assess the suitability of the protocol against the performance requirements, we will implement it on the most resource-constrained secure devices to prove its efficiency even in the worst conditions. In addition, to prove the protocol fulfills the security requirements, we will analyze it using security games and we will also formally verify it using the AVISPA and ProVerif tools
Dubreil, Jérémy. "Vérification et Synthèse de Contrôleur pour des Propriétés de Confidentialité." Phd thesis, Université Rennes 1, 2009. http://tel.archives-ouvertes.fr/tel-00461306.
Full textMartinet, Gwenaëlle. "Contribution à une théorie de la sécurité des implémentations cryptographiques." Paris 7, 2004. http://www.theses.fr/2004PA077195.
Full textSomé, Dolière Francis. "Sécurité et vie privée dans les applications web." Thesis, Université Côte d'Azur (ComUE), 2018. http://www.theses.fr/2018AZUR4085/document.
Full textIn this thesis, we studied security and privacy threats in web applications and browser extensions. There are many attacks targeting the web of which XSS (Cross-Site Scripting) is one of the most notorious. Third party tracking is the ability of an attacker to benefit from its presence in many web applications in order to track the user has she browses the web, and build her browsing profile. Extensions are third party software that users install to extend their browser functionality and improve their browsing experience. Malicious or poorly programmed extensions can be exploited by attackers in web applications, in order to benefit from extensions privileged capabilities and access sensitive user information. Content Security Policy (CSP) is a security mechanism for mitigating the impact of content injection attacks in general and in particular XSS. The Same Origin Policy (SOP) is a security mechanism implemented by browsers to isolate web applications of different origins from one another. In a first work on CSP, we analyzed the interplay of CSP with SOP and demonstrated that the latter allows the former to be bypassed. Then we scrutinized the three CSP versions and found that a CSP is differently interpreted depending on the browser, the version of CSP it implements, and how compliant the implementation is with respect to the specification. To help developers deploy effective policies that encompass all these differences in CSP versions and browsers implementations, we proposed the deployment of dependency-free policies that effectively protect against attacks in all browsers. Finally, previous studies have identified many limitations of CSP. We reviewed the different solutions proposed in the wild, and showed that they do not fully mitigate the identified shortcomings of CSP. Therefore, we proposed to extend the CSP specification, and showed the feasibility of our proposals with an example of implementation. Regarding third party tracking, we introduced and implemented a tracking preserving architecture, that can be deployed by web developers willing to include third party content in their applications while preventing tracking. Intuitively, third party requests are automatically routed to a trusted middle party server which removes tracking information from the requests. Finally considering browser extensions, we first showed that the extensions that users install and the websites they are logged into, can serve to uniquely identify and track them. We then studied the communications between browser extensions and web applications and demonstrate that malicious or poorly programmed extensions can be exploited by web applications to benefit from extensions privileged capabilities. Also, we demonstrated that extensions can disable the Same Origin Policy by tampering with CORS headers. All this enables web applications to read sensitive user information. To mitigate these threats, we proposed countermeasures and a more fine-grained permissions system and review process for browser extensions. We believe that this can help browser vendors identify malicious extensions and warn users about the threats posed by extensions they install
Grall, Hervé. "Deux critères de sécurité pour l'exécution de code mobile." Phd thesis, Ecole des Ponts ParisTech, 2003. http://tel.archives-ouvertes.fr/tel-00007549.
Full textBègue, Guillaume. "Confidentialité et prévention de la criminalité financière : étude de droit comparé." Thesis, Paris 1, 2016. http://www.theses.fr/2016PA01D019.
Full textThe recent trend towards transaprency in business highlights a more global disenchantment with the concept of secrecy. The concept of secrecy benefits from various legal expressions whose origins give it as undisputable legitimacy. This observation leads us to recognise the existence of a "Principle of confidentiality". The clash betxeen the rules of Financial Crime prevention and this principle of confidentiality is causing legal uncertainty not only for professional subject to Anti-money laundering and counter-terrorism financing regulations but also gor persons whose data is being processed. These two sets of conflicting rules nevertheless share a common goal, namely to ensure respect for fundamental rights. Notwithstanding this, both the risk of abuse of legal instruments offered by one set for illegitimate purposes and the shortcomings attached to the other set potentially hinder the efficient and reasonable use of Law. This study aims at analysing antagonistic principles to reach a certain balance by applying solutions which preserve their respective interests and contribute to legal certainty. In this regard, the comparative law analysis helps better interpret customer due diligence measures whilst rehabilitating the arguments in favour of the principle of confidentiality. This shows the development of e genuine AML/CFT Law and in particular its preventive aspects that form a major part of the Banking and Financial Regulations
Delannoy, Xavier. "Contributions à l'étude de la tension entre cohérence et confidentialité et du classement d'objets selon leur histoire dans les bases de données." Phd thesis, Université Joseph Fourier (Grenoble), 1997. http://tel.archives-ouvertes.fr/tel-00004936.
Full textBadra, Mohamad. "Le transport et la sécurisation des échanges sur les réseaux sans fil." Phd thesis, Télécom ParisTech, 2004. http://pastel.archives-ouvertes.fr/pastel-00000952.
Full textKauffmann-Tourkestansky, Xavier. "Analyses sécuritaires de code de carte à puce sous attaques physiques simulées." Phd thesis, Université d'Orléans, 2012. http://tel.archives-ouvertes.fr/tel-00771273.
Full textBarquissau, Eric. "L’évaluation de la qualité de la relation client en ligne par les utilisateurs d’espaces clients de sites web : une application dans le secteur bancaire et dans le secteur de la téléphonie mobile." Thesis, Paris 10, 2013. http://www.theses.fr/2013PA100205.
Full textThe Internet has dramatically changed the way companies interact with their customers. Because of the importance of e-customer relationship management, companies have to reconsider their strategies in terms of relationship marketing. The purpose of this research is to investigate the way users of personal websites’ accounts evaluate e-relationship quality within two sectors: the banking sector and the mobile phone sector. This research deals with an important concept: appropriation.A qualitative study has been conducted in order to build a research model and to create a measurement scale to study the appropriation of a personal websites’ account. Therefore, an online survey (N=534) was conducted to test the hypothesis. The findings suggest that the appropriation of a personal websites’ account is a mediating variable between perceived ease of use, perceived usability and relationship quality, both in the banking sector and in the mobile phone sector. In the same way, privacy has a positive influence on e-relationship quality. Moreover, perceived interactivity has a positive influence on e-relationship quality, but that particular hypothesis is partially validated. Finally, social presence does not have a positive influence on e-relationship quality
Book chapters on the topic "Sécurité et confidentialité"
SEMMOUD, Abderrazaq, and Badr BENMAMMAR. "La sécurité intelligente des réseaux informatiques." In Gestion et contrôle intelligents des réseaux, 5–28. ISTE Group, 2020. http://dx.doi.org/10.51926/iste.9008.ch1.
Full textZXIVANOVICH, Sava, Branislav TODOROVIC, Jean-Pierre LORRÉ, Darko TRIFUNOVIC, Adrian KOTELBA, Ramin SADRE, and Axel LEGAY. "L’IdO pour une nouvelle ère de réseaux unifiés, de confiance zéro et de protection accrue de la vie privée." In Cybersécurité des maisons intelligentes, 185–213. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch5.
Full textATTRAPADUNG, Nuttapong, and Takahiro MATSUDA. "Chiffrement à clé publique et notions de sécurité." In Cryptographie asymétrique, 5–53. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9096.ch1.
Full textHAMDI, Omessaad, Mohamed AYMEN CHALOUF, and Amal SAMMOUD. "Utilisation de la biométrie pour sécuriser les communications intra-BAN." In Gestion de la sécurité en e-santé, 137–59. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9179.ch6.
Full textBERGERON, Cyril, Wassim HAMIDOUCHE, and Olivier DÉFORGES. "Crypto-compression de vidéos." In Sécurité multimédia 2, 145–89. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9027.ch5.
Full textITIER, Vincent, Pauline PUTEAUX, and William PUECH. "Crypto-compression d’images." In Sécurité multimédia 2, 105–44. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9027.ch4.
Full textSCHMITT, Corinna, and Marvin WEBER. "Solution domotique pour SecureWSN." In Cybersécurité des maisons intelligentes, 1–79. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch1.
Full textConference papers on the topic "Sécurité et confidentialité"
Boulanger, J.-L., and L. Zhao. "Sécurité, confidentialité et intégrité dans les systèmes ferroviaires." In Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56197.
Full textRodríguez González, Sylvia Cristina. "Megadesarrollos turísticos de sol y playa enclaves del imaginario." In International Conference Virtual City and Territory. Barcelona: Centre de Política de Sòl i Valoracions, 2009. http://dx.doi.org/10.5821/ctv.7522.
Full textReports on the topic "Sécurité et confidentialité"
Dufour, Quentin, David Pontille, and Didier Torny. Contracter à l’heure de la publication en accès ouvert. Une analyse systématique des accords transformants. Ministère de l'enseignement supérieur et de la recherche, April 2021. http://dx.doi.org/10.52949/2.
Full text