Academic literature on the topic 'Sécurité Internet'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sécurité Internet.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Sécurité Internet"
Falque-Pierrotin, Isabelle. "Internet, sécurité et libertés." Annales des Mines - Réalités industrielles Mai 2009, no. 2 (2009): 77. http://dx.doi.org/10.3917/rindu.092.0077.
Full textNorodom, Anne-Thida. "La galaxie Internet." Questions internationales 91-92, no. 3 (June 27, 2018): 59–70. http://dx.doi.org/10.3917/quin.091.0059.
Full text-CHICHE, Thierry. "La sécurité internet appliquée aux systèmes de production." Revue de l'Electricité et de l'Electronique -, no. 06 (2001): 75. http://dx.doi.org/10.3845/ree.2001.069.
Full textMeiller, Yannick. "La sécurité de l’information devrait être plus présente dans les programmes des écoles de management." Sécurité et stratégie 32, no. 4 (March 19, 2024): 12–16. http://dx.doi.org/10.3917/sestr.032.0012.
Full textTschumi Canosa, Xavier, and Thania Paffenholz. "Coopération internationale entre paix et sécurité : portes d’entrée sur Internet." Annuaire suisse de politique de développement, no. 25-2 (October 1, 2006): 229–31. http://dx.doi.org/10.4000/aspd.282.
Full textTschudi, Hunziker, Kündig, Lüscher, Freiermuth, Heller, and Heberer. "Internet-Kommunikation zwischen Hausärzten und Universitätsspital." Praxis 91, no. 7 (February 1, 2002): 257–60. http://dx.doi.org/10.1024/0369-8394.91.7.257.
Full textBernie Baeaufort. "Vote en ligne pour les initiatives de terrain en Californie : Collecte de signatures électroniques." International Journal of Science and Society 4, no. 4 (October 18, 2022): 75–83. http://dx.doi.org/10.54783/ijsoc.v4i4.555.
Full textOuimet, Marc. "Réflexions sur Internet et les tendances de la criminalité." Criminologie 39, no. 1 (June 26, 2006): 7–21. http://dx.doi.org/10.7202/013123ar.
Full textBryce, George K., and Pran Manga. "The Effectiveness of Health and Safety Committees." Articles 40, no. 2 (April 12, 2005): 257–83. http://dx.doi.org/10.7202/050133ar.
Full textVallet, Caroline. "La cyberpédopornographie : au centre des débats." Chronique de législation 40, no. 2 (October 17, 2014): 599–615. http://dx.doi.org/10.7202/1026961ar.
Full textDissertations / Theses on the topic "Sécurité Internet"
Jacquin, Ludovic. "Compromis performance/sécurité des passerelles très haut débit pour Internet." Phd thesis, Université de Grenoble, 2013. http://tel.archives-ouvertes.fr/tel-00911075.
Full textAissaoui, Mehrez Hassane. "Sécurité pour les réseaux du futur : gestion sécurisée des identités." Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066606.
Full textToday, the Internet is changing radically our habits, especially with the massive influx of the nomadic techniques, the Internet of objects, the growing use of grid computing, wireless networks and the emergence of new approaches in recent years. In particular, the virtualization of the computing infrastructures, which allowed defining a new model called Cloud Computing, introducing an enough frank breakdown with the traditional models, can be perceived as a preparatory stage towards the Internet of future.The implementation of these approaches allows, in a different way : mutualization and organization of the computer system. It allows to dematerialize the physical infrastructures and to deport applications on distant containers. Therefore, the global architecture of Internet should be evolved. It will rely strongly on these new approaches and in particular, Cloud Computing and virtualization. However, no system is infallible especially if resources are distributed and mutualized. They raise a number of problems and involve directly security issues, which remain one of the main barriers to the adoption of these technologies.Like any new technology, Cloud Computing and virtualization create new risks, which come to graft to traditional threats of the outsourcing management of the privilege separation, the identity and accesses management, the robustness of the virtualization software, the virtual machine isolation, the personal data protection, reversibility, privacy... The traditional Internet architecture cannot provide the adequate solutions to the challenges raised by these new approaches: mobility, flexibility, security requirements, reliability and robustness. Thus, a research project (SecFuNet : Security For Future Networks) was validated by the European Commission, to provide some answers, to make a state of the art of these security mechanisms and a comprehensive study of orchestration and integration techniques based on protection components within overall security architecture
Aissaoui, Mehrez Hassane. "Sécurité pour les réseaux du futur : gestion sécurisée des identités." Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066606.
Full textToday, the Internet is changing radically our habits, especially with the massive influx of the nomadic techniques, the Internet of objects, the growing use of grid computing, wireless networks and the emergence of new approaches in recent years. In particular, the virtualization of the computing infrastructures, which allowed defining a new model called Cloud Computing, introducing an enough frank breakdown with the traditional models, can be perceived as a preparatory stage towards the Internet of future.The implementation of these approaches allows, in a different way : mutualization and organization of the computer system. It allows to dematerialize the physical infrastructures and to deport applications on distant containers. Therefore, the global architecture of Internet should be evolved. It will rely strongly on these new approaches and in particular, Cloud Computing and virtualization. However, no system is infallible especially if resources are distributed and mutualized. They raise a number of problems and involve directly security issues, which remain one of the main barriers to the adoption of these technologies.Like any new technology, Cloud Computing and virtualization create new risks, which come to graft to traditional threats of the outsourcing management of the privilege separation, the identity and accesses management, the robustness of the virtualization software, the virtual machine isolation, the personal data protection, reversibility, privacy... The traditional Internet architecture cannot provide the adequate solutions to the challenges raised by these new approaches: mobility, flexibility, security requirements, reliability and robustness. Thus, a research project (SecFuNet : Security For Future Networks) was validated by the European Commission, to provide some answers, to make a state of the art of these security mechanisms and a comprehensive study of orchestration and integration techniques based on protection components within overall security architecture
Mouelhi, Tejeddine. "Modélisation et test de mécanismes de sécurité dans des applications internet." Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-00544431.
Full textClaeys, Timothy. "Sécurité pour l'internet des objets : une approche des bas en haut pour un internet des objets sécurisé et normalisé." Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAM062.
Full textThe rapid expansion of the IoT has unleashed a tidal wave of cheap Internet-connected hardware. Formany of these products, security was merely an afterthought. Due to their advanced sensing and actuatingfunctionalities, poorly-secured IoT devices endanger the privacy and safety of their users.While the IoT contains hardware with varying capabilities, in this work, we primarily focus on the constrainedIoT. The restrictions on energy, computational power, and memory limit not only the processingcapabilities of the devices but also their capacity to protect their data and users from attacks. To secure theIoT, we need several building blocks. We structure them in a bottom-up fashion where each block providessecurity services to the next one.The first cornerstone of the secure IoT relies on hardware-enforced mechanisms. Various security features,such as secure boot, remote attestation, and over-the-air updates, rely heavily on its support. Sincehardware security is often expensive and cannot be applied to legacy systems, we alternatively discusssoftware-only attestation. It provides a trust anchor to remote systems that lack hardware support. In thesetting of remote attestation, device identification is paramount. Hence, we dedicated a part of this work tothe study of physical device identifiers and their reliability.The IoT hardware also frequently provides support for the second building block: cryptography. Itis used abundantly by all the other security mechanisms, and recently much research has focussed onlightweight cryptographic algorithms. We studied the performance of the recent lightweight cryptographicalgorithms on constrained hardware.A third core element for the security of the IoT is the capacity of its networking stack to protect the communications.We demonstrate that several optimization techniques expose vulnerabilities. For example,we show how to set up a covert channel by exploiting the tolerance of the Bluetooth LE protocol towardsthe naturally occurring clock drift. It is also possible to mount a denial-of-service attack that leverages theexpensive network join phase. As a defense, we designed an algorithm that almost completely alleviates theoverhead of network joining.The last building block we consider is security architectures for the IoT. They guide the secure integrationof the IoT with the traditional Internet. We studied the IETF proposal concerning the constrainedauthentication and authorization framework, and we propose two adaptations that aim to improve its security.Finally, the deployment of the IETF architecture heavily depends on the security of the underlying communicationprotocols. In the future, the IoT will mainly use the object security paradigm to secure datain flight. However, until these protocols are widely supported, many IoT products will rely on traditionalsecurity protocols, i.e., TLS and DTLS. For this reason, we conducted a performance study of the most criticalpart of the protocols: the handshake phase. We conclude that while the DTLS handshake uses fewerpackets to establish the shared secret, TLS outperforms DTLS in lossy networks
Saleh, Hayder. "Une architecture novatrice de sécurité à base de carte à puce Internet." Versailles-St Quentin en Yvelines, 2002. http://www.theses.fr/2002VERSA009.
Full textBachy, Yann. "Sécurité des équipements grand public connectés à Internet : évaluation des liens de communication." Thesis, Toulouse, INSA, 2015. http://www.theses.fr/2015ISAT0014/document.
Full textToday, equipment embedding software and an Internet connection are more and more numerous and various. With the emergence of “the internet of things” and the trend to interconnect everything, many equipment used in our every day life are now connected to the internet: Smart-Tvs, DVD players, alarm and home automation systems, and even health assistance home devices, for example. Unfortunately, these technological evolutions also introduce new security threats. The massive use of internet facilitates the propagation of malware, capable of targeting any computer device, and more specifically any internet connected device. Although several methods allowing security analysis of industrial systems exist, their application to home devices is still limited. The existence and the criticality of potential vulnerabilities in these devices are not well-known, because they have not been thoroughly studied. This is precisely the objective of this thesis, which presents a method allowing to carry out a vulnerability analysis of internet connected home devices. This method is composed of two main phases: a risk analysis phasefollowed by an experimental phase. The security analysis of any type of equipement, requires a good knowledge ofits environment. In order to guide the evaluator in this task, we propose, as a first step, to rely on existing risk analysis methods. These methods are now mature, and allow the evaluator to obtain a global view of the risks incurred by the usage of anequipment. Then, during the second step of our method, the evaluator concentrates on the most important risks in order to demonstrate the technical feasibility of the scenarios leading to the considered risks, by carrying out several experiments.Considering the large amount and the diversity of I/Os on connected devices, it is important to focus on specifically rich attack scenarios, possibly depending on a simple local vulnerability. For this second step, an experimental method is proposedin order to study these attack scenarios, which, moreover, target equipement whose specifications are not necessarily available.In order to illustrate the entire method, this thesis presents two case studies: Integrated Access Devices and Smart-Tvs. These studies are carried out on a panel of devices from major internet service providers and TV manufacturers, allowing us to compare several devices available on the market. The vulnerabilities pointed out, mainly concern the communication means (local loop for the IAD, DVB-T interface for the smart-TVs) connecting these devices to their service providers (ISP for the IAD, TV and VoD for the smart-TVs). These communication links are usually considered safe, and have been, to our knowledge, seldom explored. Thisthesis thereby contributes to the security analysis of these particular communication means for connected devices and points out some original attack paths. Finally, this thesis ends by presenting different existing security mechanisms that can be used to avoid exploitation of the identified weaknesses
Vu, Van-Hoan. "Infrastructure de gestion de la confiance sur internet." Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2010. http://tel.archives-ouvertes.fr/tel-00611839.
Full textGuillet, Thomas. "Sécurité de la téléphonie sur IP." Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00559130.
Full textGuillet, Thomas. "Sécurité de la téléphonie sur IP." Phd thesis, Paris, Télécom ParisTech, 2010. https://pastel.hal.science/pastel-00559130.
Full textThis work focuses on the security of telephony networks deployed in the Internet. Without any doubt after the Web and messaging application, this service will impose IP (Internet Protocol) infrastructures like the standard for all types of information or media. Initially, we look for opportunities to strengthen the security of SIP (Session Initiation Protocol) IETF protocol currently massively adopted in the telephony infrastructure. We propose and validate innovative solutions to strengthen existing mechanisms in a completely transparent way for infrastructures. We choose to focus on authentication, because it is the first mechanism encountered by users or systems. The solutions presented below propose new security properties by defining a semantic field called "opaque". In a second step, we are interested in security solutions for end-to-end calls. Analysis of application solutions as “Future Narrow Band Digital Terminal” and “Simple Secure Voice over IP protocol“ allows us to formalize the specification of an architecture to protect conversations whatever the specificities and heterogeneity of networks ToIP are. Finally, the conclusion takes over and takes positions on the various contributions to this work in the context of IP telephony. Our will to be interoperable with the underlying or independent infrastructure can be considered as a value added service
Books on the topic "Sécurité Internet"
Ghernaouti-Hélie, Solange. Internet et sécurité. Paris: Presses universitaires de France, 2002.
Find full textPiette-Coudol, Thierry. Les objets connectés: Sécurité juridique et technique. Paris: Lexis Nexis, 2015.
Find full textSimon, Cooper, and Chapman D. Brent, eds. Building Internet Firewalls: Internet and Web security. 2nd ed. Beijing: O'Reilly, 2000.
Find full textBloch, Laurent. Sécurité informatique: Principes et méthode. Paris: Eyrolles, 2007.
Find full textChapman, D. Brent. Building Internet firewalls. Cambridge, MA: O'Reilly & Associates, 1995.
Find full textD, Zwicky Elizabeth, ed. Building Internet Firewalls. Sebastopol, CA: O'Reilly & Associates, 1995.
Find full textOppliger, Rolf. Internet and Intranet security. Boston: Artech House, 1998.
Find full textInternet and Intranet security. 2nd ed. Boston, MA: Artech House, 2002.
Find full text1974-, Lacour Stéphanie, Asphalès (Research program), and Centre national de la recherche scientifique (France), eds. La sécurité aujourd'hui dans la société de l'information. Paris: Harmattan, 2007.
Find full text1974-, Lacour Stéphanie, Asphalès (Research program), and Centre national de la recherche scientifique (France), eds. La sécurité aujourd'hui dans la société de l'information. Paris: Harmattan, 2007.
Find full textBook chapters on the topic "Sécurité Internet"
KHALIL, Ahmad, Nader MBAREK, and Olivier TOGNI. "Adaptation du contrôle d’accès pour la sécurité de l’IoT." In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 169–204. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch7.
Full textAL AGHA, Khaldoun, Pauline LOYGUE, and Guy PUJOLLE. "Internet des Edges : la virtualisation." In Edge Networking, 157–78. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9068.ch8.
Full textAL AGHA, Khaldoun, Pauline LOYGUE, and Guy PUJOLLE. "Le déploiement de l’Internet participatif." In Edge Networking, 221–39. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9068.ch11.
Full textWalczack, Cathy, and Serge Keroullé. "9 Le MASE : Manuel Amélioration Sécurité Entreprises." In La sous-traitance interne, 241–56. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7-011.
Full textWalczack, Cathy, and Serge Keroullé. "9 Le MASE : Manuel Amélioration Sécurité Entreprises." In La sous-traitance interne, 241–56. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7.c011.
Full textMoinet, Nicolas, and Guilhem Armanet. "Outil 28. La communication interne." In La boîte à outils de la sécurité économique, 92–93. Dunod, 2015. http://dx.doi.org/10.3917/dunod.moine.2015.01.0092.
Full textAgut, Gérard, and Alain Colman. "14 La politique hygiène et sécurité d’une PME de mécanique industrielle." In La sous-traitance interne, 296–303. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7-016.
Full textAgut, Gérard, and Alain Colman. "14 La politique hygiène et sécurité d’une PME de mécanique industrielle." In La sous-traitance interne, 296–303. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7.c016.
Full textDuchêne, François. "12 Formations externes à la sécurité pour les établissements classés Seveso, un dispositif sous pression1." In La sous-traitance interne, 272–86. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7-014.
Full textDuchêne, François. "12 Formations externes à la sécurité pour les établissements classés Seveso, un dispositif sous pression1." In La sous-traitance interne, 272–86. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7.c014.
Full textConference papers on the topic "Sécurité Internet"
Rodríguez González, Sylvia Cristina. "Megadesarrollos turísticos de sol y playa enclaves del imaginario." In International Conference Virtual City and Territory. Barcelona: Centre de Política de Sòl i Valoracions, 2009. http://dx.doi.org/10.5821/ctv.7522.
Full textReports on the topic "Sécurité Internet"
Marsden, Eric. Partage des modèles de sécurité entre donneurs d’ordres et entreprises intervenantes. Fondation pour une culture de sécurité industrielle, December 2018. http://dx.doi.org/10.57071/360upb.
Full textGautrais, Vincent, and Nicolas Aubin. Modèle d'évaluation des facteurs relatifs à la circulation des données: Instrument de protection de la vie privée et des droits et libertés dans le développement et l’usage de l’intelligence artificielle. Observatoire international sur les impacts sociétaux de l'IA et du numérique, March 2022. http://dx.doi.org/10.61737/rrlb1735.
Full textFlandin, Simon, Germain Poizat, and Romuald Perinet. Proactivité et réactivité: deux orientations pour concevoir des dispositifs visant le développement de la sécurité industrielle par la formation. Fondation pour une culture de sécurité industrielle, February 2021. http://dx.doi.org/10.57071/948rpn.
Full textMbaye, Safiétou, Rémi Kouabenan, and Philippe Sarnin. L'explication naïve et la perception des risques comme des voies pour améliorer les pratiques de REX: des études dans l'industrie chimique et l'industrie nucléaire. Fondation pour une culture de sécurité industrielle, September 2009. http://dx.doi.org/10.57071/311rex.
Full textFICHE D’INFORMATION : D’auto-défenseurs à justiciers : un cadre typologique pour les groupes armés communautaires. RESOLVE Network, December 2020. http://dx.doi.org/10.37805/fs2020.6.cbags.fr.
Full text