Academic literature on the topic 'Stockage sécurisé'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Stockage sécurisé.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Stockage sécurisé"
IRENGE MUFUNGIZI, Augustin, and Marcolline MBOLIBILANI ANIHILI. "Développement d’un site web d’archivage numérique des travaux de recherche dans les institutions d’enseignement supérieur et universitaire de la ville d’Isiro." Revue du Centre de Recherche Interdisciplinaire de l'Université Pédagogique Nationale 96, no. 4 (May 1, 2021): 37–50. http://dx.doi.org/10.62362/omsz2018.
Full textDjizanne, Hippolyte, Benoit Brouard, Grégoire Hévin, and Carelle Lekoko. "Stabilité mécanique à long terme des cavités salines de stockage d’hydrogène." Revue Française de Géotechnique, no. 177 (2023): 3. http://dx.doi.org/10.1051/geotech/2024023.
Full textPEIGNIER, Ingrid, Nathalie DE MARCELLIS-WARIN, and Martin TRÉPANIER. "Portrait des pratiques organisationnelles de sécurité des transporteurs routiers de matières dangereuses au québec." Revue Française de Gestion Industrielle 33, no. 3 (September 1, 2014): 51–69. http://dx.doi.org/10.53102/2014.33.03.784.
Full textLe Cotty, Tristan, Élodie Maître d’Hôtel, Issoufou Porgo, Julie Subervie, and Raphaël Soubeyran. "Le warrantage, un dispositif pour améliorer la sécurité alimentaire en Afrique subsaharienne." Perspective, no. 61 (2023): 1–4. http://dx.doi.org/10.19182/perspective/37141.
Full textGusev, Alexander, Arnaud Leconte, and Simone Lucatello. "Green Digital Transition and Data Governance." L'Europe en Formation 396, no. 1 (November 13, 2023): 59–83. http://dx.doi.org/10.3917/eufor.396.0059.
Full textLiney, Thomas, Alexandre Mitov, Gbago Laurent Onivogui, and Nicole Arrighi. "Les biobanques, des structures essentielles à la recherche médicale." médecine/sciences 36, no. 3 (March 2020): 274–76. http://dx.doi.org/10.1051/medsci/2020040.
Full textMellal, Ahmed, and Abdelkader Derbal. "L’OMC et les programmes de stockage publics à des fins de sécurité alimentaire dans les PED : avancées et perspectives." Dirassat Journal Economic Issue 11, no. 1 (January 1, 2020): 547–66. http://dx.doi.org/10.34118/djei.v11i1.118.
Full textEtienne Kenfack, Pierre. "Limiter la braderie des terres d'Afrique centrale : un enjeu de portée planétaire." Revue Juridique de l'Environnement 43, no. 1 (2018): 33–42. http://dx.doi.org/10.3406/rjenv.2018.7191.
Full textOhayon, A., M. Rousseau, N. Fuss, I. Vincent, A. M. Taburet, and S. Drouot. "Sécuriser le stockage pour prévenir les erreurs liées à l’administration du KCl injectable (KCl inj)." Le Pharmacien Hospitalier et Clinicien 48, no. 4 (December 2013): 264. http://dx.doi.org/10.1016/j.phclin.2013.10.025.
Full textRochard, Joël. "Le secteur viticole face au défi alimentaire mondial : intérêt de la protection des vignobles de forte pente, peu valorisables pour les cultures vivrières." BIO Web of Conferences 56 (2023): 04001. http://dx.doi.org/10.1051/bioconf/20235604001.
Full textDissertations / Theses on the topic "Stockage sécurisé"
Ton, That Dai Hai. "Gestion efficace et partage sécurisé des traces de mobilité." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLV003/document.
Full textNowadays, the advances in the development of mobile devices, as well as embedded sensors have permitted an unprecedented number of services to the user. At the same time, most mobile devices generate, store and communicate a large amount of personal information continuously. While managing personal information on the mobile devices is still a big challenge, sharing and accessing these information in a safe and secure way is always an open and hot topic. Personal mobile devices may have various form factors such as mobile phones, smart devices, stick computers, secure tokens or etc. It could be used to record, sense, store data of user's context or environment surrounding him. The most common contextual information is user's location. Personal data generated and stored on these devices is valuable for many applications or services to user, but it is sensitive and needs to be protected in order to ensure the individual privacy. In particular, most mobile applications have access to accurate and real-time location information, raising serious privacy concerns for their users.In this dissertation, we dedicate the two parts to manage the location traces, i.e. the spatio-temporal data on mobile devices. In particular, we offer an extension of spatio-temporal data types and operators for embedded environments. These data types reconcile the features of spatio-temporal data with the embedded requirements by offering an optimal data presentation called Spatio-temporal object (STOB) dedicated for embedded devices. More importantly, in order to optimize the query processing, we also propose an efficient indexing technique for spatio-temporal data called TRIFL designed for flash storage. TRIFL stands for TRajectory Index for Flash memory. It exploits unique properties of trajectory insertion, and optimizes the data structure for the behavior of flash and the buffer cache. These ideas allow TRIFL to archive much better performance in both Flash and magnetic storage compared to its competitors.Additionally, we also investigate the protect user's sensitive information in the remaining part of this thesis by offering a privacy-aware protocol for participatory sensing applications called PAMPAS. PAMPAS relies on secure hardware solutions and proposes a user-centric privacy-aware protocol that fully protects personal data while taking advantage of distributed computing. For this to be done, we also propose a partitioning algorithm an aggregate algorithm in PAMPAS. This combination drastically reduces the overall costs making it possible to run the protocol in near real-time at a large scale of participants, without any personal information leakage
Vasilopoulos, Dimitrios. "Reconciling cloud storage functionalities with security : proofs of storage with data reliability and secure deduplication." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS399.
Full textIn this thesis we study in depth the problem of verifiability in cloud storage systems. We study Proofs of Storage -a family of cryptographic protocols that enable a cloud storage provider to prove to a user that the integrity of her data has not been compromised- and we identify their limitations with respect to two key characteristics of cloud storage systems, namely, reliable data storage with automatic maintenance and data deduplication. To cope with the first characteristic, we introduce the notion of Proofs of Data Reliability, a comprehensive verification scheme that aims to resolve the conflict between reliable data storage verification and automatic maintenance. We further propose two Proofs of Data Reliability schemes, namely POROS and PORTOS, that succeed in verifying reliable data storage and, at the same time, enable the cloud storage provider to autonomously perform automatic maintenance operations. As regards to the second characteristic, we address the conflict between Proofs of Storage and deduplication. More precisely, inspired by previous attempts in solving the problem of deduplicating encrypted data, we propose message-locked PoR, a solution that combines Proofs of Storage with deduplication. In addition, we propose a novel message-locked key generation protocol which is more resilient against off-line dictionary attacks compared to existing solutions
Qiu, Han. "Une architecture de protection des données efficace basée sur la fragmentation et le cryptage." Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0049.
Full textIn this thesis, a completely revisited data protection scheme based on selective encryption is presented. First, this new scheme is agnostic in term of data format, second it has a parallel architecture using GPGPU allowing performance to be at least comparable to full encryption algorithms. Bitmap, as a special uncompressed multimedia format, is addressed as a first use case. Discrete Cosine Transform (DCT) is the first transformation for splitting fragments, getting data protection, and storing data separately on local device and cloud servers. This work has largely improved the previous published ones for bitmap protection by providing new designs and practical experimentations. General purpose graphic processing unit (GPGPU) is exploited as an accelerator to guarantee the efficiency of the calculation compared with traditional full encryption algorithms. Then, an agnostic selective encryption based on lossless Discrete Wavelet Transform (DWT) is presented. This design, with practical experimentations on different hardware configurations, provides strong level of protection and good performance at the same time plus flexible storage dispersion schemes. Therefore, our agnostic data protection and transmission solution combining fragmentation, encryption, and dispersion is made available for a wide range of end-user applications. Also a complete set of security analysis are deployed to test the level of provided protection
Jemel, Mayssa. "Stockage des données locales : sécurité et disponibilité." Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0053.
Full textDue to technological advancements, people are constantly manipulating multiple connected and smart devices in their daily lives. Cross-device data management, therefore, remains the concern of several academic and industrial studies. The proposed frameworks are mainly based on proprietary solutions called private or closed solutions. This strategy has shown its deficiency on security issues, cost, developer support and customization. In recent years, however, the Web has faced a revolution in developing standardized solutions triggered by the significant improvements of HTML5. With this new version, innovative features and APIs are introduced to follow business and user requirements. The main purpose is to provide the web developer with a vendor-neutral language that enables the implementation of competing application with lower cost. These applications are related neither to the used devices nor to the installed software. The main motivation of this PhD thesis is to migrate towards the adoption of standardized solutions to ensure secure and reliable cross-device data management in both the client and server side. There is already a proposed standardized Cloud Digital Safe on the server side storage that follows the AFNOR specification while there is no standardized solution yet on the client-side. This thesis is focused on two main areas : 1) the proposal of a standardized Client Digital Safe where user data are stored locally and 2) the synchronization of these data between the Client and the Cloud Digital Safe and between the different user devices. We contribute in this research area in three ways. First, we propose a Client Digital Safe based on HTML5 Local Storage APIs. We start by strengthening the security of these APIs to be used by our Client Digital Safe. Second, we propose an efficient synchronization protocol called SyncDS with minimum resource consumption that ensures the synchronization of user data between the Client and the Cloud Digital Safe. Finally, we address security concerns, in particular, the access control on data sharing following the Digital Safe requirements
Chiquet, Pierre. "Mécanismes thermophysiques déterminant la sécurité du stockage géologique du CO2." Pau, 2006. http://www.theses.fr/2006PAUU3045.
Full textCO2 underground storage as an option for reducing greenhouse gases emissions consists of trapping industrial CO2 and injecting it into deep geological formations such as saline aquifers and hydrocarbons reservoirs. This study aims at assessing leakage processes and evaluating storage capacities. To this end, two leakage phenomena were considered, caprock capillary breakthrough and diffusional transport. The former involves interfacial properties of the brine/CO2/mineral system: brine/CO2 interfacial tension and rock wettability under dense CO2. Chapter one presents a series of IFT measurements performed at temperatures and pressures up to 45 MPa-110°C. Results show a great decrease of IFT with pressure in the 0-to-20 MPa range beyond what it tends to stabilize at values in the order of 25-30 mN. M-1. Chapter two deals with rock wettability. Dynamic contact angles were measured on muscovite mica and quartz up to 10 MPa. Results highlight an alteration of wettability with pressure that was accounted for by means of a DLVO based model. Direct capillary entry pressures on a clay stone sample are proposed in chapter three. Diffusion, is treated in chapter four. We used the Taylor dispersion method to measure D up to 40 MPa. Results indicate low values in the order of 2. 10-9 m2. S-1. Chapter five discuses the consequences of the previous parameters in terms of storage capacity
Shah, Virenkumar. "Propriétés interfaciales contrôlant la sécurité du stockage géologique des gaz acides." Pau, 2008. http://www.theses.fr/2008PAUU3015.
Full textAcid gas geological storage is a process under which acid gas (CO2, H2S) is injected in a geological formation and thus stored away from the atmosphere for a long time (hundreds of years). It is a promising process to reduce CO2 atmospheric emissions and an alternative to the transformation of H2S into sulphur by the Claus process. In this process, the acid gas buoyantly rises to the top of the formation and accumulates beneath the caprock, a low permeable medium imbibed with water. This thesis investigates the interfacial properties involved in capillary failure of the caprock: water/acid gas interfacial tension (IFT) and caprock’s water-wettability. It presents the first ever systematic IFT and contact angle measurements under storage conditions (up to 150 bar and 120°C) with H2S-rich acid gases, as well as a model to predict IFTs between water and non-polar or slightly-polar compounds. Water/H2S IFT decreases with increasing pressure and levels off at around 9-10 mN/m at high pressure and temperature (T ≥ 70°C, P > 120 bar). However, wettability alteration due to the presence of dense acid gas is limited in the case of natural and model substrates typically present in the caprock, except in the case of mica, which exhibits pronounced alteration in the presence of H2S. These properties have a strong impact on various quantities of practical interest in geological storage, such as the maximum injection and storage pressure and potential storage capacity of a given formation. These quantities are significantly lowered in the case of H2S-rich gas as compared to CH4 and even CO2; they should be carefully determined when planning an acid gas geological storage operation
Oualha, Nouha. "Sécurité et coopération pour le stockage de donnéees pair-à-pair." Paris, ENST, 2009. http://www.theses.fr/2009ENST0028.
Full textSelf-organizing algorithms and protocols have recently received a lot of interest in mobile ad-hoc networks as well as in peer-to-peer (P2P) systems, as illustrated by file sharing or VoIP. P2P storage, whereby peers collectively leverage their storage resources towards ensuring the reliability and availability of user data, is an emerging field of application. P2P storage however brings up far-reaching security issues that have to be dealt with, in particular with respect to peer selfishness, as illustrated by free-riding attacks. The continuous observation of the behavior of peers and monitoring of the storage process is an important requirement to secure a storage system against such attacks. Detecting peer misbehavior requires appropriate primitives like proof of data possession, a form of proof of knowledge whereby the holder interactively tries to convince the verifier that it possesses some data without actually retrieving them or copying them at the verifier. We propose and review several proof of data possession protocols. We in particular study how data verification and maintenance can be handed over to volunteers to accommodate peer churn. We then propose two mechanisms, one based on reputation and the other on remuneration, for enforcing cooperation by means of such data possession verification protocols, as periodically delivered by storage peers. We assess the effectiveness of such incentives with game theoretical techniques. We in particular discuss the use of non-cooperative one-stage and repeated Bayesian games as well as that of evolutionary games
Sanchez, Bernard. "Insécurité des approvisionnements pétroliers et effet externe : le cas du stockage de sécurité." Montpellier 1, 1997. http://www.theses.fr/1997MON10007.
Full textChaou, Samira. "Modélisation et analyse de la sécurité dans un système de stockage pair-à-pair." Phd thesis, Université d'Evry-Val d'Essonne, 2013. http://tel.archives-ouvertes.fr/tel-00877094.
Full textCavalcante, Janaide. "Traitement des sables à la bentonite pour la constitution de la barrière de sécurité passive des centres de stockage de déchets." Lyon, INSA, 1995. http://www.theses.fr/1995ISAL0027.
Full text[This work is carry out on impervious barriers destined for landfill engineering composed by compacted sand-bentonite mixtures. French regulations require a barrier with a permeability less than lE-09rn/s. Standard tests often used in geotechnical engineering has allowed possible the establishment of a methodology to verify the behavoiur of this barrier during the presence of leachate. In the first part we have sought to define from swell tests and Atterberg limits tests the interactions bentonite-leachates. We realised the permeability testing to water and leachate for various samples constituted of compacted sand-bentonite mixtures. Emperical models allowed to estimate the permeability, tests results, experimental results and tests methods are proposed. ]
Books on the topic "Stockage sécurisé"
Implantation d'un site de stockage de déchets nucléaires: Sécurité et problèmes urbanistiques. Paris: L'Harmattan, 2008.
Find full textConseil canadien es ministres de l'environnement., ed. Code de recommendations techniques pour la protection de l'environnement applicable aux systèmes de stockage hors sol et souterrains de produits pétroliers et de produits apparentés. Winnipeg, Man: Conseil canadien des ministres de l'environnement, 2003.
Find full textTanks, Canadian Council of Ministers of the Environment National Task Force on Storage. Environmental code of practice for aboveground storage tank systems containing petroleum products. [Ottawa]: Published by the National Task Force on Storage Tanks for the Canadian Council of Ministers of the Environment, 1994.
Find full textCanadian Council of Ministers of the Environment. National Task Force on Storage Tanks. Environmental code of practice for aboveground storage tank systems containing petroleum products. [Ottawa]: Minister of Supply and Services, 1994.
Find full textCanadian Council of Ministers of the Environment. Environmental code of practice for aboveground and underground storage tank systems containing petroleum and allied petroleum products. Winnipeg: Canadian Council of Ministers of the Environment, 2003.
Find full textGuidance on assigning ignition probabilities in onshore and offshore quantitative risk assessments. 2nd ed. London: Energy Institute, 2019.
Find full textOsti, Giorgio. Storage and Scarcity: New Practices for Food, Energy and Water. Taylor & Francis Group, 2016.
Find full textStorage and Scarcity: New Practices for Food, Energy and Water. Taylor & Francis Group, 2016.
Find full textOsti, Giorgio. Storage and Scarcity. Taylor & Francis Group, 2020.
Find full textBook chapters on the topic "Stockage sécurisé"
WACHTEL, Cl. "85 ans après, un risque toujours présent." In Médecine et Armées Vol. 45 No.1, 81–86. Editions des archives contemporaines, 2017. http://dx.doi.org/10.17184/eac.7460.
Full textPUTEAUX, Pauline, and William PUECH. "Insertion de données cachées dans le domaine chiffré." In Sécurité multimédia 2, 233–77. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9027.ch7.
Full textITIER, Vincent, Pauline PUTEAUX, and William PUECH. "Crypto-compression d’images." In Sécurité multimédia 2, 105–44. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9027.ch4.
Full textAYMEN CHALOUF, Mohamed, Hana MEJRI, and Omessaad HAMDI. "Intelligence artificielle pour la sécurité en e-santé." In Gestion de la sécurité en e-santé, 213–35. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9179.ch9.
Full textReports on the topic "Stockage sécurisé"
Fontecave, Marc, and Candel Sébastien. Quelles perspectives énergétiques pour la biomasse ? Académie des sciences, January 2024. http://dx.doi.org/10.62686/1.
Full text