Tesis sobre el tema "Gestion des identités et des accès"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 48 mejores tesis para su investigación sobre el tema "Gestion des identités et des accès".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Diop, Mamadou Abdoulaye. "Analyse haute performance de masses de données; application à la détection d'anomalie dans le contexte de la gestion d'identité et d'accès". Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG100.
Texto completoData protection is a critical issue in cybersecurity. Organizations use identity and access management software and traditional cybersecurity tools to protect their information assets from external threats. However, they most often lack solutions to counter insider threats from individuals with legitimate access to corporate information systems. This type of threat is now the primary concern of cybersecurity specialists. User and entity behavior analysis software are the tools used by cyber specialists to counter insider threats effectively. However, existing solutions can present problems such as many false alarms and a consequent development time of detection models when the activity data is of large volumes.This thesis aims to remedy these problems by proposing an algorithmic solution and its efficient implementation for high performance architectures. More precisely, we propose a detection method that builds behavioral profilers using techniques from the fields of machine learning, linear algebra and high performance computing. This method is defined by application of “unite and conquer” approach, used in linear algebra, to ensemble learning techniques. We integrate innovative methods of PageRank and autoencode in the proposed ensemble method in addition to the classical basic machine learning methods.According to our experiments, this new method of insider threat detection shows an average efficiency in terms of detection accuracy, up to 98% of AUC. This is a significant increase compared to base methods. We also propose an implementation of this method according to several parallel programming paradigms allowing us to obtain a speedup up to 10.We have integrated this software platform with data preprocessing means and an alarm system into a global module for insider threat detection, capable of extending cybersecurity tools
Chanton, Olivier. "Stratégies de gestion des identités et influence sociale". Paris 10, 1999. http://www.theses.fr/1999PA100120.
Texto completoNasser, Ali Djambae. "Accès aux soins et gestion des flux migratoires". Thesis, Normandie, 2018. http://www.theses.fr/2018NORMR050.
Texto completoMayotte a French overseas department since 2011, is part of the comorian archipelago from which it was separated from the State of Union of the Comoros islands since 1975. The introduction of a visa in 1995 and the order n° 2002-688 delivered on 12 july 2004 and entered into force on April 1st 2005 with regard to the extension of social security in Mayotte exclude the foreign sick from Mayotte's health system. This leads to a process of medical evacuation following an illegal immigration way that causes shipwrecks and the violation of the patient's rights. The attraction of Mayotte and Mainland France for disadvantaged populations lead to conflict situations and competition in the access to health and social protection. Mayotte's disadvantaged populations, who are struggling to catch up with the mainland, do not get along with that competition. At the same time the illegal immigrants living clandestinely and with the threat of expulsion are facing difficulties to assert their right to health care and to benefit from social system assistance. Obstacles are numerous and most of the time considerable, mainly because of discrimination, because of their judicial status, of disparity in their social and economical difficulties and because of their generaly very hard living conditions. The control of migratory flow and the fight against illegal immigrant remain the top priorities of the French government policy as far as immigration is concerned. The singularity of the situation in the department of Mayotte and the huge migratory flows that have been observed led healthcare authorities to handle migratory movements related to illegal medical evacuations. France has a healthcare policy and continues to support the Union of Comoros in the effort to improve healthcare access and quality, through support programs to health sector. These programs aim at improving the health of mothers and children, mainly in reducing maternal mortality. Through its organisation AFD, France aims at supporting health ministry in elaborating and implementing public policies and helping comorian state to put in place regulatory mechanisms of a private service within public sector and to reform the national pharmacy. This work focus on the issues related to the right to social protection and the health law for foreigners on the national territory, in mainland France and in Mayotte as well. Diversity of national laws applicable in Mayotte is a significant barrier to local devices in terms of medical and social assistance. It is necessary to seek legal solutions related to standardization of this health and social law in order to better the healthcare system. During our field research we observed that local devices such as the "pink warrant" and the "good AGD" are not at all equivalent to the national devices (AME and CMUc)
Soenen, Guillaume. "Identités organisationnelles et communautés de pratique : Le cas d'une société de conseil". Jouy-en Josas, HEC, 2006. http://www.theses.fr/2006EHEC0014.
Texto completoThis thesis deals with organizational learning, and more specifically with learning organizations. I mobilize the concept of organizational identity and focuses on a specific mode of organizing: intra-organizational communities of practice. First, I develop a model conceptualizing organizational identity as a system composed of five interacting facets. Second, I articulate a renewed definition of communities of practice as collective answers to prescription failures. A quantitative study of four communities of practice allows the establishment of a link between membership into a community and individuals' preference for certain sources of knowledge. This result confirms that communities of practice are more than a mere linguistic formula and are a distinct psycho-sociological reality. In a third phase, a comparative study is used to reveal the factors which contribute to this specific form of social network that can be defined as an “organizational mousse”
Bah, Abdramane. "Interopérabilité et sécurité des systèmes d'information : application aux systèmes de gestion de l'éducation". Thesis, Nantes, 2020. http://www.theses.fr/2020NANT4028.
Texto completoAccess control for shared services is an essential requirement for a federation of services from different domains. In this thesis, we tackled two access control problems : authorizing users and delegating user authentication to their own domains. To address these problems, we have proposed a method of authorizing users based on the attribute mapping technique and a federated access control mechanism to implement this authorization method. We have proposed a service federation method to delegate user authentication to their domains. The main objective is to allow various domains to collaborate despite the heterogeneity of their security models
Ates, Mikaël. "Identités numériques : gestion inter-organisationnelle centrée sur l'utilisateur et respectueuse de la vie privée". Phd thesis, Université Jean Monnet - Saint-Etienne, 2009. http://tel.archives-ouvertes.fr/tel-00443910.
Texto completoBenjelloun, Mohamed Amine. ""Don et anonymat : la question des identités"". Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM5032/document.
Texto completoThrough our practice of child psychiatry and confronted with the lived of families concerned with the question of gametes or organs donation, it seems that numerous aporia related to donation and anonymity experiences have not been considered by medicine. If donation and anonymity have been central to medicine to the point that they have become principles, they have never been subjects of education or profound reflection. Philosophy and literature also bring some possible answers. Donation is a present without the presence, carrying with itself some abandonment, without reason, to someone who doesn't ask for anything, precisely because he would not know that he was given something. Anonymity gives an opportunity to fade away, just to be able to meet the other, closer. This obliteration starts from the very beginning. It aims at any founding trace, in order, paradoxically to allow the subject to approach in wandering and doubt a possible encounter with the unknown and the outside, far from an otherness that be only would be radical.Finally, the issue of organ donation, of gamete donation, of anonymity, forces us to rethink simultaneously the question of relationship and identity. The donor and recipient, meet and are necessarily immersed in the other's time: how to build a sphere for oneself and a sphere for the other, an intersubjectivity which would enable the communication between materials of different origin? How to recognize ego and alter, as ipseities? Concepts of narrative identity, entangled stories allow to pass over the question of anonymity. Anonymity would then protect identity. And better still, would allow for an ethical recognition to happen
Aḵẖtar, Salīm. "Evaluation de la capacité et gestion des ressources radio pour système AMRC de troisième génération". Paris, ENST, 2001. http://www.theses.fr/2001ENST0021.
Texto completoTurgeon-Pelchat, Catherine. "La mer à boire : accès à la ressource et gestion des pêches à St. Paul's River". Thesis, Université Laval, 2011. http://www.theses.ulaval.ca/2011/27932/27932.pdf.
Texto completoZonou, Bienvenu. "Interactions entre problématiques foncières et identités socio-territoriales dans l'Ouest du Burkina Faso". Toulouse 2, 2008. https://tel.archives-ouvertes.fr/tel-01295009.
Texto completoThis paper shows what is now at stake for land management in the Burkina Faso. An extensive fieldwork allows us to suggest three ways to consider the land question, to prospect for giving security to the land. Three villages in western Burkina Faso have been analysed, chronologicaly, to show the progress changes and take into account the identity question. Indeed, the agro-ecological factors make western Burkina Faso a much appealing zone, at nation scale, for its agricultural potentialities. The growing migration phenomenon contributes to the rarefaction of available land. The growing appraisal of those territories, the evolution of production systems, land planning, popularization new techniques, commercial crops development; exchanges monetization have contributed to the land rarefaction. Interactions between migration, production system changes, new social and territorial identities lead to a much more complex land management system. The actors'strategies, in order to reach and appropriate land, is a vivid sign of the social and territorial reorganizations connected to the land rarefaction in these villages. Thus we ask questions about resource sustainable management and civil peace guaranty. From this set of information, our paper brings the local land management variety and peculiarity modes. The historical aspects, the local scale and an interdisciplinary approach are essential. The identity question constitutes a novel approach in this work and an interesting contribution to demography-land, production-land relationship. It shows the social dynamics at work beyond the triptych "man-space-resources"
Risterucci, Gabriel. "Mécanismes et outils pour sécurisation de systèmes à accès distants : application aux systèmes de gestion électronique de documents". Thesis, Aix-Marseille, 2016. http://www.theses.fr/2016AIXM4010/document.
Texto completoThis thesis' goal is the improvement of the security of remotely accessed systems with the use of cryptographic tools. Specifically it is applied to digital documents management software that raise issues in three fields~: communication, authentication and rights management. Unlike common approaches that involve the use of individual protections for these three fields, we offer a set of tools made to work together to improve the system's security. Securing communication is done thanks to a new secure communication protocol designed for distributed applications. Authentication issues led to the development of two tailored solutions providing cryptographic support to the application for any authentication method. Rights management is handled through new associations between a given access right and specific cryptographic applications. A key element of those solutions is the emphasis put on the usability of these secure tools. It swayed the development of our proposals toward more transparent solutions that would not disturb the user experience. As a result, we obtained a secure system made of these tools and mechanisms that work together to provide full and transparent security for a digital documents management software. This security is fully based on cryptographic algorithms to provide provable and verifiable security properties. As a supporting layer for these mechanisms, a secure software library was designed to provide all the required tools for cryptographic uses in a portable way
Thivant, Eric. "La dimension informationnelle de la conception et de la gestion de produits de placement fiancier : accès à l'information et description numérique". Lyon 3, 2003. http://www.theses.fr/2003LYO33010.
Texto completoThis thesis focuses on the information process at work in the financial market world. We analyse information seeking practices within the activities of development and design of financial products by coupling the information seeking behavior theories together with the financial theories. We thus describe the information resources and the information seeking and use processes of professional practitioners. We then develop a formalized and rigorous tool entitled " A Mark-up Language for Financial Products " or MLFP, a XML - based markup language. That tool enables us to specify the most important items used in the course of these activities. That digital tool can be used both by the financial products manager and the designer in order to describe or update financial products while having precise and reliable informations on their direct competitive environment at their disposal
Foissac, Véronique. "Conception et protection du système de gestion de données personnelles d'un établissement de santé". Montpellier 1, 2003. http://www.theses.fr/2003MON10002.
Texto completoVeaudor, Manon. "Les « frontières » de l’ordre carcéral : Affectation, négociation des identités et surveillance en maison d’arrêt". Thesis, université Paris-Saclay, 2020. http://www.theses.fr/2020UPASU001.
Texto completoAbstract: This thesis deals with the practices of assigning detainees inside short-term prisons. Our findings are based on an ethnographic survey in men’s prisons. We examine the ways in which order is produced through observing prison warders’ practices – ways in which prisoners are classified, categorized, assigned and monitored. The analysis takes also into account the observed practices from the inmates’ perspective. By combining the study of the modes of identifying inmates with how the detention sectors are organized, this study wants to show that space management also shapes individual “careers” within the institution.To this end, it analyses the ways in which the prison order is produced in relation to its external environment, and in particular the prisoners’ territories of origin. Three approaches are put to the test: one focuses on the study of the arrivals’ quarters; another one revolves around the assignment practices as they are implemented and perceived; the third one eventually looks at the implementation of prison intelligence. These entry points make it possible to grasp the way in which prison practices and categories filter, i.e. select, information on the external environment of the institution but also on the trajectory of prisoners. The reconfiguration of surveillance practices in the light of contemporary reforms of penal confinement will therefore be examined from this perspective. The material used in this study is the result of a nine-month ethnographic survey in two short-term prisons in different French regions. It combines the observation of professional practices in detention and the role of professionals in assignment commissions. It is also based on semi-directive interviews conducted with detainees, supervisory and management staff
Zins, Damien. "Le bus volubilis. Étude et développement de l'accès réseau. Gestion et analyse des performances". Nancy 1, 1990. http://docnum.univ-lorraine.fr/public/SCD_T_1990_0184_ZINS.pdf.
Texto completoDiouf, Diéyi. "Quelle méthodologie pour l'archivage et la diffusion électronique de la documentation scientifique et technique". Troyes, 2009. http://www.theses.fr/2009TROY0037.
Texto completoOpen archive are a mode of publication currently enjoying great success as shown by the huge increase in the number of deposits made by the researchers and other users. Thus, between 2000 and 2009, the open archive HAL has had around 70,000 deposits made into its collections. Globally, the new enthusiasm for open archives has not been without a negative impact on sales of traditional editorial system of for-profit journals and other publishers around the world. Thus what are open archives? Who are the key players? What rules govern the operations of open archives? What methods of indexing are deployed by and in managing open archives? What issues for Africa? These questions are the key motivators of this thesis. The existence of open archives is not a fact rather it is a process, a broad awareness of the issues involved in the visibility of academic research and the need for technological equipments and adequate training to carry out related activities. In Africa, the adoption of this system necessarily requires the commitment and cooperation of political and academic authorities and most especially, the accreditation organisations such as the African and Malagasy Council for Higher Education (CAMES)
Decouchant, Dominique. "Partage et migration de l'information dans un système réparti à objets". Phd thesis, Grenoble 1, 1987. http://tel.archives-ouvertes.fr/tel-00324431.
Texto completoSeitz, Ludwig. "Conception et mise en oeuvre de mécanismes sécurisés d'échange de données confidentielles : application à la gestion de données biomédicales dans le cadre d'architectures de grilles de calcul / données". Lyon, INSA, 2005. http://theses.insa-lyon.fr/publication/2005ISAL0055/these.pdf.
Texto completoGrid computing allows users to share multiple heterogeneous resources, such as computing power, storage capacity and data, and provides an architecture for transparent interoperation of these resources from the user's point of view. An upcoming application for Grids is health-care. More than for the first applications of Grids (e. G. Particle physics, terrestrial observation), security is a major issue for medical applications. Conventional data protection mechanisms are only of limited use, due to the novel security challenges posed by Grids. To respond to these challenges we propose an access control system that is decentralized and where the owners of some data are in control of the permissions concerning their data. Furthermore data may be needed at very short notice, the access control system must support a delegation of rights that is effective immediately. Grid users also need delegation mechanisms to give rights to processes, that act on their behalf. As these processes may spawn sub processes, multi-step delegation must be possible. In addition to these usability requirements, the transparent storage and replication mechanisms of Grids make it necessary to implement additional protection mechanisms for confidential data. Access control can be circumvented by attackers having access to the physical storage medium. We therefore need encrypted storage mechanisms to enhance the protection of data stored on a Grid. In this thesis we propose a comprehensive architecture for the protection of confidential data on Grids. This architecture includes an access control system and an encrypted storage scheme
Arango, Luisa. "Ethnographies de la gestion de l'eau à Tuti (Khartoum, Soudan) et Cano de Loro (Carthagène, Colombie) : histoire, localité et politique dans une perspective d'anthropologie urbaine comparée". Thesis, Paris 8, 2015. http://www.theses.fr/2015PA080043/document.
Texto completoAt the turn of the twentieth century, numerous cities such as Cartagena (Colombia) and Khartoum (Sudan), adopted a centralized technical and administrative model for the management of drinking water. Associated since its construction to planned urban development projects, the water network constitutes a political technology and becomes a landmark of urban spatiality, for politicians as well as for technicians and urban dwellers. The compared analysis of access strategies, daily usage, and the role of water in the imagination of two populations with an ambiguous urban status – Caño de Loro (Cartagena) and Tuti (Khartoum) – allows us to approach the social complexity of contemporary cities in the South. The comparison supposes a reflexive orientation that leads us, over and beyond the socio-political dynamics of each context, to critically consider our categories of analysis. In the first part the water network is contextualized in the history of each city, where its recent apparition and setting up rests upon the reinforcement or creation of dense power relations, as well as a new conception of nature, particularly of water. Such relational and political features lead to, in the second part, an understanding of how the materiality of water and its sharing produces particular localities within the urban space. Therefore, the analysis of relations between public and private spheres through everyday water exchanges lets us discuss the relevance of the notion of “collective management” of resources in Cartagena and Khartoum. The third part considers the mechanisms draw on by different actors within the particular context of urban planning to negotiate their margin of action on land and water. It highlights the political dimension of identity categories as well as the transformative power of individual and collective actions in situations where resource management is crossed with individual, local, national, and global logics at the same time
Ruz, Sébastien. "Pour une sociologie des societes civiles immobilières : logiques patrimoniales, dynamiques familiales et professionnelles, identités socio-juridiques : le cas de la région lyonnaise (1978-1998)". Lyon 2, 2005. http://theses.univ-lyon2.fr/documents/lyon2/2005/ruz_s.
Texto completoSociété Civile Immobilière (SCI) is a French legal technique intended to purchase and manage different kinds of real estates. Since the beginning of the 1980’s this concept has been very successful. The béneficiaries range from individuals (with various degrees of wealth) to legal advisers, lawyers, chartered accountants and bankers in charge of theirs client’s investments. The first are referred to as “users”, whilst the latter ones are referred to as “inventors”. This phenomenon represents an important economic, legal, urban and social phenomenon which has not yet been analysed by social science specialists. Therefore the main challenge of this analysis is to convert a legal and financial topic to a sociological one. Our methodology is based upon the main economic, legal, scientific and technological sociologies. The shareholders in a SCI, i. E. Owners of an intangible estate investment, have a particular social-legal identity. They have a hybrid status, at the junction between the home owner and the investor. This positions them more or less consciously in the middle of a contemporary rationalisation process of investment and estate management practices. This system illustrates the growing business-awareness of the home owner. He is defined as a project manager, more or less innovative who evolves in an ever-changing environment and is capable of formulating various scenarios. He follows a career path. However he can be helped in defining his projects both on a strategic and tactical level by experts in property ownership. The use or even the over-use of this technique means there is an increasing diversification in the property ownership counselling jobs. These growing trends are occurring in a growing market and in an inter-professional system where material and intellectual issues rival with collaborations, co-operations and synergies. The hinges of a relationship with unite professionals and shareholders are, amongst others: interactivity, performance, trust and honesty. The diffusion of company information and its materialistic repercussions go through diverse and various socialising instances. SCI practices and techniques used lead towards a legal acculturation. Shareholders assimilate and juggle with SCI norms leading sometimes to confrontation with social, cultural, family, contractual, ethical or moral ones. Syncretism has been more or less successful. The second main objective of this analysis is to observe what place the law takes in an individual/collective system, i. E. To look at the inter-normalisation phenomenon. SCI rules can be considered as contractual rules which help build a dynamic collective action, or can feed the illusion. They can just easily structure or disorganise groups of shareholders
Valette, Héloïse. "Articuler protection des ressources et accès à l'eau potable : quel cadre théorique, quels enjeux empiriques ? : le cas de l'Indonésie". Thesis, Toulouse 1, 2019. http://www.theses.fr/2019TOU10043.
Texto completoThe difficulty to link together both water resources protection and drinking water access for all is the starting point of the PhD thesis. In a context of anthropic and climatic pressures on water resources, these two objectives can no longer be disconnected from a theoretical and empirical point of view. However the issue of this articulation is rarely studied in social sciences. Therefore the thesis aims to fill this gap by developing an original analytical framework. This framework merges institutionalist approaches and political ecology. The first one discusses the elaboration of water governance rules while the second one takes into account power relations in the coordination of actors. This is analyzed through the water qualifications the actors refer to in order to justify the legitimacy of a water governance mode in a specific context. The thesis analyzes two complementary Indonesian case studies, based on a qualitative methodology. In Indonesia the issue of articulation is a key issue: water resources pollution is a constraint to drinking water access and the country is affected by water allocation conflicts involving drinking water consumers. The first case study examines the elaboration of a controversy rule the main law regulating the water sector (water as a resource and water as a service). This process is analyzed through the justification discourses of actors who oscillate between objectives of equitable drinking water access and other of the protection of water resources. The second one studies an Indonesian town, Surakarka, which concentrates issues related to both resource sustainability and drinking water access: pollution at water catchment points, population density or conflicts over the allocation of water resources. In both cases, a long-term analysis of institutional dynamics shows the moments of change, characterized by new hierarchies of the objectives of water resource protection and of drinking water access. This thesis also shows the importance of power relations between actors to prioritize one objective over another, in relation to the water qualification process
Ducousso, Rieul. "Sécurisation des accès aux périphériques et depuis les périphériques dans une architecture multicœur RISC-V utilisée pour la virtualisation". Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS040.
Texto completoToday, computer security is a major topic in various fields such as healthcare, transport, industry or defense. Systems integrated an ever increasing number of components developed by untrusted sources. Covert channel attacks subvert system mechanism to create a communication channel between entities that otherwise shouldn't be able to communicate thus breaching data confidentiality. These attacks circumvent classical isolation mechanisms by allowing processes or virtual machines to exchange and exfiltrate data. Most attacks target the processor and its neighbouring components. We propose a new side-channel attack exploiting the temporal variations due to the memory hierarchy to implement a communication channel. This attack breaks the isolation between peripherals of a virtualized system opening a communication channel between two malicious devices. This attack relies on the adaptation of principles exploited by covert channels on processors with specificities of peripherals. We show that it is possible to exchange data between two devices isolated by an IOMMU. Secondly, we modify the microarchitecture of the IOMMU to reduce the impact of such attacks. The defense strategy is to decorrelate the operations performed by the peripherals and the internal state of its components. We show in simulation and on a system incorporating a processor running Linux implemented on a board FPGA the effects of this countermeasure on the isolation as well as on the device performance. This countermeasure reduces the throughput covert channel without however negating it fully. The impact on performance of peripheral memory accesses is limited
Dillaerts, Hans. "Libre accès à la communication scientifique et contexte français : prospective, développement et enjeux pour la créativité et l'interdisciplinarité ?" Phd thesis, Conservatoire national des arts et metiers - CNAM, 2012. http://tel.archives-ouvertes.fr/tel-00768432.
Texto completoRouchier, Juliette. "La confiance à travers l'échange : accès aux paturages au Nord-Cameroun et échanges non-marchands : des simulations dans des systèmes multi-agents". Orléans, 2000. https://tel.archives-ouvertes.fr/tel-00349010.
Texto completoYin, Shaoyi. "Un modèle de stockage et d'indexation pour des données embarquées en mémoire flash". Versailles-St Quentin en Yvelines, 2011. http://www.theses.fr/2011VERS0008.
Texto completoNAND Flash has become the most popular stable storage medium for embedded systems. Efficient storage and indexing techniques are very challenging to design due to a combination of NAND Flash constraints and embedded system constraints. In this thesis, we propose a new model relying on two basic principles: database serialization and database stratification. An indexing technique called PBFilter is presented to illustrate these principles. Analytical and experimental results show that the new approach meets very well the embedded system requirements. The PBFilter technique has been integrated into a complete embedded DBMS engine PlugDB. PlugDB is used in a real-life application implementing a secure and portable medico-social folder. PlugDB can be also seen as a central building block for a global vision named Personal Data Server, whose objective is to manage personal information in a secure, privacy-preserving and user-controlled way
Traoré, Boukaye Boubacar. "Modélisation des informations et extraction des connaissances pour la gestion des crises". Thesis, Toulouse, INPT, 2018. http://www.theses.fr/2018INPT0153.
Texto completoThe rise of emerging data collection technologies offers new opportunities for various scientific disciplines. IT is expected to play its part by developing intelligent data analysis techniques to provide some insight into solving complex problems. The content of this doctoral research dissertation is part of the general problem of extracting knowledge from data by computer techniques. This PhD work focuses, firstly, to the problem of information modeling for crisis management requiring medical care, using a collaboration of computer applications of telemedicine. We proposed a methodology for managing a remote crisis in three stages. It is mainly focused on the collaboration of telemedicine acts (Teleconsultation, Teleexpertise, Telemonitoring, Remote Assistance, and Medical Regulation), from the transport phase of victims to the phase of medical treatment in and / or between health structures. This methodology not only helps to provide crisis managers with a computerized decision aid system, but also to minimize the financial costs and to reduce the response time of emergency through an organized management of the crisis. Secondly, we studied in detail the extraction of knowledge using data mining techniques on satellite images to discover epidemic r risk areas, including the case study focused on the cholera epidemic in the region of Mopti, Mali. Thus, a methodology of six phases was presented by relating the data collected in the field and satellite data to prevent and more effectively monitor the epidemic crises. The results show that 66% of the contamination rate is related to the Niger River, in addition to certain societal factors such as garbage dumps in winter. As a result, we have been able to establish the link between the epidemic and its development environment, which will enable decision makers to better manage a possible crisis of epidemic. And finally, during an epidemic crisis situation, we focused on medical analysis, more specifically by the use of portable microscopes to confirm or not the presence of pathogens in samples of case suspects. To do this, we have presented a methodology in six phases, based on the techniques of deep learning including one of convolutional neural network techniques, transfer learning that take advantage of complex systems and analysis of large amounts of data. The idea is to train networks convolutional neural automatic image classification pathogens. For example in our case study, this approach was used to distinguish a microscopic image containing the cholera epidemic virus called Vibrio cholerae from a microscopic image containing the malaria epidemic virus called Plasmodium. This allowed us to obtain good performances with a classification accuracy of 99%. Subsequently, the idea is to deploy this pathogen image recognition solution in intelligent portable microscopes for routine analysis and medical diagnostic applications in crisis management. This will make it possible to fill the lack of specialists in microscopic manipulation and a considerable time saving in the analysis of the samples with precise measures favoring the accomplishment of the work under better conditions
Mangin, d'Hermantin Bertrand. "Nouvelle figure de l'encadrement en proximité dans une entreprise en transformation : une analyse clinique des identités professionnelles et leurs troubles au carrefour d'enjeux institutionnels, professionnels et psychiques". Thesis, Sorbonne Paris Cité, 2018. http://www.theses.fr/2018USPCC128.
Texto completoSince the end of the 1980s, SNCF has been committed to renewing its managerial model. This railway company progressive mutation resulted into a call to managerial practise’s evolution; the evolution also concerned the supervisors' role in the running of the organization. Through these evolutions, a new figure of the agent as a singular and subjective subject has gradually been established within the company. Our thesis focuses on the current forms of professional identities of proximity supervisors to the yardstick of these recent institutional transformations. In a clinical approach focused on the study of the subjective constructions of the subjects, we analyze the ambiguity of the relationship maintained by proximity supervisors to this new figure of the agent. The institutional contents come to legitimate, among the interviewed professionals, a connection to the team characterized by a community logic. Simultaneously, they weaken the supervisors in their affiliation to the leading group and expose them to internal anxieties due in particular to the mental burden represented by the intimate problems addressed to them by their agents. In addition, our research questions the emergence of a new Protée’s figure of the proximity supervisor, constantly recomposing herself in the way in which she reveals her affiliations, her postures, her relationships with the team and the company. Our field survey is also about the powerlessness and downgrading feelings produced by the juridical frame and logic proper to the railway company, specifically regarding employee’s protection, on the proximity supervisors. Finally, we question the sacrificial postures adopted by certain professionals as answers to this particular institutional functioning
MICHEL, Charlotte. "L'accès du public aux espaces naturels, agricoles et forestiers et l'exercice du droit de propriété : des équilibres à gérer". Phd thesis, ENGREF (AgroParisTech), 2003. http://tel.archives-ouvertes.fr/tel-00007570.
Texto completoAvier, Grégory. "Les émotions, "ce que nous faisons nous-mêmes de ce qu'elles ont fait de nous" : identités et nouvelles logiques d'action du manager public dans les collectivités territoriales". Electronic Thesis or Diss., Aix-Marseille, 2013. http://www.theses.fr/2013AIXM1126.
Texto completoAt a time in history when emotion wants to be an auxiliary driver in running local government, this research reverses the concept where snapshots and events are seen as ways of expressing and dealing with "fluid societies." Based on a critical, interdisciplinary and humanistic approach, it studies organisational behaviour in a social world seriously affected by a "managerialism" that is mutilating the history, culture, and identity of managers in local authorities. Reinstating the biographical approach as a strategy for getting to the core of reality, the research highlights a "psychological contract" based on a "stable equilibrium", the result of a "double biographical and relational transaction" which focusses on "the ethics of the common good", the midpoint between the ethics of conviction and responsibility. It then examines the working principles that are surfacing in local government today, where "the organisation's image" as a "mental prison" leads to behaviour ranging from defection to resistance
Bertrand, Yoann. "Gestion du contrôle de la diffusion des données d’entreprises et politiques de contrôles d’accès". Thesis, Université Côte d'Azur (ComUE), 2017. http://www.theses.fr/2017AZUR4012/document.
Texto completoThe main objective of this thesis is to solve the problem of unintentional data leakage within companies. These leaks can be caused by the use of both Access Control (AC) and Transmission Control (TC) policies. Moreover, using both AC and TC can lead to many problems for the security experts and the administrators that are in charge of the definition and maintenance of such policies. Among these problems, we can underline the genericity problem of existing models, the coherence problem between AC and TC rules and problems such as density, adaptability, interoperability and reactivity. In this thesis, we first define a meta-model to take into account the main AC models that are used within companies. We also propose a coherent and semi-automatic generation of TC policies based on existing AC to tackle the coherence problem. Moreover, several mechanisms have been proposed to tackle complexity, adaptability and interoperability issues. In order to validate the relevance of our solution, we have first conducted a survey among security experts and administrators. This survey has highlighted several information regarding the policies’ size and density, the tiresomeness of having to define them and the interest for several functionalities that can cover the aforementioned problems. Finally, our solution has been tested on stochastically generated and real policies in order to take performances and reactivity under consideration. Results of these tests have validated that our solution covers the underlined problems
Liu, Ziqin. "Les jeunes diplômés chinois à l’épreuve de la précarité. Mobilités, accès à l’emploi et rapport au travail. Le cas des jeunes migrants qualifiés dans les villages-urbains à Pékin". Thesis, Lyon, École normale supérieure, 2014. http://www.theses.fr/2014ENSL0956/document.
Texto completoThis thesis is part of the broader issue of the transformation of the labor market in China over the past two decades and the place of young migrant workers in this process. In the context of economic transition, Chine has witnessed many important changes such as the phenomenon of urban labor market segmentation, the rise in unemployment and the massive creation of informal jobs, all leading to increased mobility in the working world, as seen particularly in the phenomenon of mass domestic migration. Migrant working youth – especially university graduates from a rural background (or smaller cities) who move to large cities - are being increasingly relegated to the urban areas of vulnerability (Robert Castel,1995) where different forms of precariousness (especially in terms of employment and housing) overlap and accumulate. China’s strong economic growth has given rise to inequalities that are multiplying and deepening at a dizzying rate. Upward mobility seems broken as feeling of injustice is rising. This migration phenomenon, a simultaneous transformation of the labor market and urban restructuring, is the focus of our study. We shall examine the case of young skilled migrants living in urban villages in Beijing, analytical figures of metamorphosis in progress. This research was conducted between 2011 and 2012 in an urban village in Beijing. The subjects had between 2 and 8 years of professional experience and lived in urban villages in Beijing at the time of the survey. This research is based on empirical data collected and analyzed using various methods. Our fieldwork in China enabled us to distribute180 questionnaires (quantitative data), 60 biographical interviews (qualitative material) as well as an ethnographic observation in an urban village. This study aims to investigate, in terms of careers, the process of professional integration and the experience of migration of graduates by looking at structural factors (employment policy, migration policy, networks, etc.), and the narrative pattern used by young people to relate their journey, in order to highlight the mechanisms that produce inequalities and construct social identities underlying the changes being observed in China. Our study has three objectives. The first is to understand both the different positions and statuses held and the way in which young people interpret their journey from their perspective, the positions they hold and the strategies they adapt. The second objective is to demonstrate how their objective and subjective identities interact and are redefined, as well as how their relationships toward work are formed. Thirdly, the goal is to articulate the issue of professional integration and its relationship to physical space, in a context where mobility is becoming a social norm in both the working world and the management of migration (Hélène Pellerin 2011)
Kamel, Michel. "Patrons organisationnels et techniques pour la sécurisation des organisations virtuelles". Toulouse 3, 2008. http://thesesups.ups-tlse.fr/326/.
Texto completoA Virtual Organization (VO) is a temporary alliance of enterprises that come together to share skills and resources in order to better respond to business opportunities and whose cooperation is supported by computer networks. Methods and tools are needed to support the interconnection of the partners' Information Systems (IS). The realization of this interconnection poses organizational and technical security challenges. The heterogeneity of the practices and the architectures adopted by traditional organizations makes this interconnection a hard task to realize. We have addressed the issues of building VOs on technical and organizational levels. Technically, we have defined distributed access control solutions providing the authentication and authorization services within the collaborative network while allowing each organization to keep total control on its own resources. Thus, we propose solutions integrating Privilege Management Infrastructures and identity federation. However, the implementation of these technical solutions depends on the maturity levels of the security practices deployed by the different partners. Thus, we adopted the ISO 27000 standards and the maturity level concept to define a model for assessing security maturity levels. Based on this model, we developed a tool for assessing the security practices of each partner which allows to quantify the level of trust that we can have in this partner. Our technical solutions and tool were evaluated within the context of the VIVACE European project
Angueletou-Marteau, Anastasia. "Accès à l'eau en périphérie : petits opérateurs privés et pauvreté hydraulique domestique : enjeux de gouvernance dans les zones périurbaines de Mumbai, Inde". Phd thesis, Grenoble 2, 2009. http://tel.archives-ouvertes.fr/tel-00441281.
Texto completoLatapie, Bruno. "Problèmes d'ordonnancement à contraintes cumulatives et leur application aux télécommunications par satellite en AMRT/CNC". Compiègne, 1991. http://www.theses.fr/1991COMPD349.
Texto completoAvier, Grégory. "Les émotions, "ce que nous faisons nous-mêmes de ce qu'elles ont fait de nous" : identités et nouvelles logiques d'action du manager public dans les collectivités territoriales". Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM1126.
Texto completoAt a time in history when emotion wants to be an auxiliary driver in running local government, this research reverses the concept where snapshots and events are seen as ways of expressing and dealing with "fluid societies." Based on a critical, interdisciplinary and humanistic approach, it studies organisational behaviour in a social world seriously affected by a "managerialism" that is mutilating the history, culture, and identity of managers in local authorities. Reinstating the biographical approach as a strategy for getting to the core of reality, the research highlights a "psychological contract" based on a "stable equilibrium", the result of a "double biographical and relational transaction" which focusses on "the ethics of the common good", the midpoint between the ethics of conviction and responsibility. It then examines the working principles that are surfacing in local government today, where "the organisation's image" as a "mental prison" leads to behaviour ranging from defection to resistance
Dulong, de Rosnay Melanie. "La mise à disposition des œuvres et des informations sur les réseaux : régulation juridique et régulation technique". Phd thesis, Université Panthéon-Assas - Paris II, 2007. http://tel.archives-ouvertes.fr/tel-00666307.
Texto completoCheaito, Marwan. "Un cadre de spécification et de déploi[e]ment de politiques d'autorisation". Toulouse 3, 2012. http://thesesups.ups-tlse.fr/1617/.
Texto completoOur work proposes a methodology for the conception and the development of an adaptable authorization system that can cover the requirements of access control in organizations such as the heterogeneity of organizational practices, the technologies used and the contexts to consider. To answer, two approaches of management have guided our study: the attribute based access control and the policy based management. * The attribute based access control permits to specify permissions related to any security characteristics of users, actions, resources and environment. This approach addresses the problems related to the expressivity of languages of authorization policies. * The policy based management, for its part, aims to enable the dynamic adaptability behavior of the system through the management of policies. Roughly, the architecture supporting this approach consists of two main entities: a policy decision point (PDP), and a policy enforcement point (PEP). The PDP is independent of the managed element, which interprets the policy and takes management decisions based on it. The PEP is the interface between the PDP and the managed element. It compels the managed system to execute the management decisions taken by the PDP. This architecture supports the integration of the management system in a managed environment. Therefore, we have chosen the standard XACML as a target technology because it supports both approaches. If in a theoretical point of view, XACML seems to address the issues of adaptability. However, systems designed according to this standard are limited to a given situation. In fact, a developed XACML system that satisfies the given requirements and a particular technological environment cannot be easily reused in another context. Therefore, it is necessary to define a methodology in order to render such authorization system adaptable in practice. Our approach is to define a minimal authorization system (i. E. A core that only supports the standard XACML) that can be easily extended for specific requirements in a given situation (ex. , the ability to express and implement policies including complex constraints, adaptation to a particular technological environment, etc. ). This raises the following questions: * What extensions that should be imported to the minimal authorization system? Is it possible to reuse the extensions for different situations? For example, the number of technologies used to store the user credentials is limited (ex. , LDAP, MySQL, Active Directory). However, the user credentials and the structuring of the data of user credentials may differ from one organization to another. * How to manage the lifecycle of the extensions in the authorization system ? In fact, there is a strong link between the use of an extension and the requirements expressed in an authorization policy. For example, the existence in the authorization system of an extension to retrieve the role of the user in a MySQL database is required only if the authorization system must evaluate at least one policy that includes constraints on the role of users. Otherwise, this extension does not happen to be present in the minimal authorization system. Similarly, if a policy including constraints on user roles is loaded into the authorization system, the associated extension must be added also. Based on the various studies from the field of software engineering related to the concept of adaptability, we have identified the requirements of adaptation of authorization systems. This work allows us to determine a classification of extensions according to the requirements of adaptability in authorization systems of type XACML. We have also proposed a methodology to facilitate the creation of extensions and promoting their reusability in the authorization system. Finally, we have addressed the problem of managing the lifecycle of the extensions in the authorization system by proposing the concept of "self-contained policy". A self-contained policy includes the authorization rules and any necessary information in order the authorization system interprets and runs it (i. E. , the extensions and their configurations). Also, we have described the architecture for specifying and deploying self-contained policies using the approach components-oriented services. Our architecture is flexible and dynamically adaptable. We have implemented it using the OSGi framework in order to validate our work in both terms of feasibility, and performance. In addition, we have conducted a self-contained policy editor that facilitates the writing of authorization rules and the configuration of the used extensions
Etien-Gnoan, N'Da Brigitte. "L'encadrement juridique de la gestion électronique des données médicales". Thesis, Lille 2, 2014. http://www.theses.fr/2014LIL20022/document.
Texto completoThe electronic management of medical data is as much in the simple automated processing of personal data in the sharing and exchange of health data . Its legal framework is provided both by the common rules to the automated processing of all personal data and those specific to the processing of medical data . This management , even if it is a source of economy, creates protection issues of privacy which the French government tries to cope by creating one of the best legal framework in the world in this field. However , major projects such as the personal health record still waiting to be made and the right to health is seen ahead and lead by technological advances . The development of e-health disrupts relationships within one dialogue between the caregiver and the patient . The extension of the rights of patients , sharing responsibility , increasing the number of players , the shared medical confidentiality pose new challenges with which we must now count. Another crucial question is posed by the lack of harmonization of legislation increasing the risks in cross-border sharing of medical
Huynh, Nghi. "Vérification et validation de politiques de contrôle d'accès dans le domaine médical". Thesis, Paris Est, 2016. http://www.theses.fr/2016PESC1042/document.
Texto completoIn healthcare, data digitization and the use of the Electronic Health Records (EHR) offer several benefits, such as reduction of the space occupied by data, or the ease of data search or data exchanges. IT systems must gradually act as the archivists who manage the access over sensitive data. Those have to be checked to be consistent with patient privacy wishes, hospital rules, and laws and regulations.SGAC, or Solution de Gestion Automatisée du Consentement, aims to offer a solution in which access to patient data would be based on patient rules, hospital rules and laws. However, the freedom granted to the patient can cause several problems: conflicts, hiding of the needed data to heal the patient or simply data-capture error. Therefore, verification and validation of policies are crucial: to conduct this verification, formal methods provide reliable ways to verify properties like proofs or model checking.This thesis provides verification methods applied on SGAC for the patient: it introduces the formal model of SGAC, verification methods of properties such as data reachability or hidden data detection. To conduct those verification in an automated way, SGAC is modelled in B and Alloy; these different models provide access to the tools Alloy and ProB, and thus, automated property verification with model checking
Roy, Thibault. "Visualisations interactives pour l'aide personnalisée à l'interprétation d'ensembles documentaires". Phd thesis, Université de Caen, 2007. http://tel.archives-ouvertes.fr/tel-00176825.
Texto completoCette thèse, prenant place en Traitement Automatique des Langues, a pour objectif d'aider les utilisateurs dans de telles situations.
Les systèmes traditionnellement proposés (tels les moteurs de recherche) ne donnent pas toujours satisfaction aux utilisateurs pour des tâches répétées, prenant peu en considération leur point de vue et leurs interactions avec le matériau textuel.
Nous proposons dans cette thèse que la personnalisation et l'interaction soient au centre de nouveaux outils d'aide pour l'accès au contenu d'ensembles de textes.
Ainsi, nous représentons le point de vue de l'utilisateur sur ses domaines d'intérêt par des ensembles de termes décrits et organisés selon un modèle de sémantique lexicale différentielle.
Nous exploitons de telles représentations pour construire des supports cartographiques d'interactions entre l'utilisateur et l'ensemble de textes, supports lui permettant de visualiser des regroupements, des liens et des différences entre textes de l'ensemble, et ainsi d'appréhender son contenu.
Afin d'opérationnaliser de telles propositions, nous avons mis au point la plate-forme ProxiDocs.
Différentes validations de la plate-forme, prenant place dans des contextes pluridisciplinaires variés allant notamment de la recherche d'information sur Internet à l'étude d'expressions métaphoriques, ont ainsi permis de dégager la valeur ajoutée de nos propositions.
Atallah, Eve. "Une solution pour l'établissement non planifié de groupes sécurisés permettant des communications sûre dans les réseaux MANets purs". Phd thesis, Université de Limoges, 2008. http://tel.archives-ouvertes.fr/tel-00417459.
Texto completoYounsa, Harouna Hassane. "Les services d'eau face aux défis urbains sahéliens : insécurité hydrique et initiatives pour l'accès à l'eau dans les quartiers périphériques de Niamey (Niger)". Thesis, Bordeaux 3, 2019. http://www.theses.fr/2019BOR30036.
Texto completoLong queues, buckets, yellow canisters, women and children talking around water fountains. From here starts the unending back and forth of the water carriers, using rickshaws, animal powered carts or eventually walking. This sight which has disappeared elsewhere and reminds the urban history of rich countries such as France, is everyday life for the dwellers of Sahelian cities. Niamey, Niger’s capital city, located in the heart of the Sahel region, is the country’s most important urban area. The access to public service water is characterized by a socio-spatial fragmentation consequence of a faster spatial extension than the extension of the network which is timidly growing year after year. In many districts, mainly in those having a peripheral location regarding infrastructures (factories, reservoirs), the access is also marked by socio-temporal discontinuities. They come from an urbanization of poverty, quick and badly initiated for more than 50 years. To that, one needs to add a hot and arid natural environment, competing with the anthropogenic need for the control of water resources. From then on, the fragmentation of the access to water has been unprecedented, enlarging even more the gap between the ones who are connected to the network and the ones who are not. These forgotten ones manage to satisfy their need for water using alternative services derived from the network and the ones who are autonomous manage using drillings or mini-networks. This huge amount of water services coming from individual or collective initiatives in Niamey allow a hybrid access to water for the citizens. Without this contribution, the hydric balance at the scale of the city wouldn’t be reached during heatwaves where, whether connected to the network or not , the quest for water requires imagination and know-how from the families. So, beyond this situation of hydric uncertainty described by this thesis at the scale of habitat and town, it also tries to detect the different socio-economical and socio-technical structural factors which make better access to water a problem. To understand these factors so as to put them into perspective in a space lay-our proposition of the point of access to water is a proof of the reduction of the effects which weigh heavily on the availability of water in the Sahel such as heat and poverty. In fine, conciliating uncontrolled urbanization and a lasting offer of water services, spatially and socially adapted seems to be an answer to these Sahelian urban challenges given by the example of Niamey
Onkaraiah, Santhosh. "Modélisation et conception de circuits à base de mémoires non-volatiles résistives innovantes". Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM4759.
Texto completoThe grave challenges to future of traditional memories (flash and DRAM) at 1X nm regime has resulted in increased quest for new physical state variables (other than charge or voltage), new devices and architectures offering memory and logic functions beyond traditional transistors. Many thin film devices with resistance change phenomena have been extensively reported as ’promising candidates’. Among them, Ox- ide Resistive Memory (OxRRAM) and Conductive Bridge Resistive Memory (CBRAM) are leading contenders for the next generation high density memories. In this work, we focus on the role of Resistive Memories in embedded memories and their impact on FPGAs in particular. We begin with the discussion on the compact modeling of resistive memory devices for design enabling, we have designed novel circuits of non- volatile flip-flop (NVFF), non-volatile look-up table (NVLUT), non-volatile 2x2 switch and non-volatile SRAM (NVSRAM) using Resistive Memories. We simulated the impact of these design structures on the FPGA system assessing the performance parameters of area, delay and power. By using the novel 1T-2R memory element concept of CBRAMs in FPGAs to implement Look-up Tables (NVLUT), we would scale down the area impact by 5%, enhance speed by 24% and reduce the power by 18% compared to SRAM based FPGAs. The thesis addresses aspects of compact modeling, circuit design and system evaluation using resistive memories
Pascal, Benjamin. "DE LA « TERRE DES ANCÊTRES » AUX TERRITOIRES DES VIVANTS : Les enjeux locaux de la gouvernance sur le littoral sud-ouest de Madagascar". Phd thesis, Paris, Muséum national d'histoire naturelle, 2008. http://www.theses.fr/2008MNHN0009.
Texto completoFollowing in-depth rethinking of the renewable resources management, local governance is now the subject of growing interest among the administration and scientific communities. Our study tackles this wide issue, in particular by using empirical data collected on the southwestern Malagasy coast. Detached from the prescriptive aspects (through the notion of “good governance”), we see that this concept covers a particularly interesting analytical dimension. This involves considering the dynamic processes of elaboration and interaction that are established between several types of actors and institutions involved in the management and use of the same space. In view of the complexity of these processes, I will then explore the links between local governance and territoriality of the actors. Locally, the effects of the exogenous interventions are then analysed from the angle of territorial dynamics
Yu, Chen. "Accès et Possession: Deux modalités d'expérience de consommation Le cas des visiteurs d'exposition et des collectionneurs d'œuvres d'art contemporain". Phd thesis, 2006. http://pastel.archives-ouvertes.fr/pastel-00994776.
Texto completoPoirier, Mathieu. "Relations publiques et communications organisationnelles : analyse des processus de communication interne à des fins d'information dans le cadre d'une gestion de crise". Mémoire, 2012. http://www.archipel.uqam.ca/4467/1/M12358.pdf.
Texto completoDriouch, El Mahdi. "Allocation des ressources et ordonnancement dans des systèmes MIMO-CDMA". Mémoire, 2009. http://www.archipel.uqam.ca/1914/1/M10766.pdf.
Texto completoDesjardins, David. "Utilisation de la base de données nationale d'inscription par les firmes de courtage et les régulateurs canadiens : gestion des renseignements personnels". Thèse, 2003. http://hdl.handle.net/1866/2409.
Texto completoThe subject of the present text concems the National Registration Database, a recent mandatory registration system designated for all brokerage firms and investment advisors across Canada, with the exception of those who exercise their activities exclusively in Quebec. The matter of protection of personal information included in this database is analyzed with an emphasis on the existence of multiple laws evolving in Canada. In fact, different mIes apply whether you are in the presence of a public body or an enterprise of the private sector and whether the "transaction" is concluded within or out of the province. The National Registration Database replaces the previous paper format registration procedure. The documents produced by this computerized system have their own particularities and certain mIes must be respected in order to maintain a legal value equal to the priOf format. Finally, the compiling of information found in this enormous database would be useless if it was not possible to access its information. Once the different types of access are determined, a comparison will be done with existing American online registration systems. It is obvious that technology has had a tremendous impact on the economy. Of course, the financial industry is affected. With the National Registration Database, the whole Canadian securities registration system has had a total makeover. It was about time...
"Mémoire présenté à la Faculté des études supérieures en vue de l'obtention du grade de Maître en droit (LL.M.)"