Literatura académica sobre el tema "Logiciel de sécurité"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Logiciel de sécurité".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Logiciel de sécurité"
Alama, Hakim El, Amal Ait Haj Said y Adnane Benmoussa. "Création d’un logiciel de modélisation en hémovigilance et sécurité transfusionnelle". Transfusion Clinique et Biologique 23, n.º 4 (noviembre de 2016): 281. http://dx.doi.org/10.1016/j.tracli.2016.08.037.
Texto completoChemla, Jean-Paul, Matthieu Lescieux y Bernard Riera. "Un ascenseur miniature jumeau réel d’une maquette numérique". J3eA 22 (2023): 1027. http://dx.doi.org/10.1051/j3ea/20231027.
Texto completoFréguin-Gresh, Sandrine, Lissania Padilla, Karen Pavon, Douglas Elizondo, Geneviève Cortès, Valentina Banoviez Urrutia, Alissia Lourme Ruiz, Sandrine Dury y Emmanuelle Bouquet. "Explorer les liens entre agriculture, migration et sécurité alimentaire : une enquête auprès de ménages agricoles diversifiés et multilocalisés du nord-ouest du Nicaragua". Cahiers Agricultures 28 (2019): 9. http://dx.doi.org/10.1051/cagri/2019009.
Texto completoGaillard, Cédric, Sofyan Martin, Pierre-Marie Bosc, Jalila El-Ati, Marie Claude Dop, Tarek Trabelsi, Marie-Josephe Amiot y Sandrine Dury. "Explorer les liens entre agriculture et sécurité alimentaire : une enquête auprès des femmes du gouvernorat de Sidi-Bouzid en Tunisie". Cahiers Agricultures 27, n.º 1 (enero de 2018): 15501. http://dx.doi.org/10.1051/cagri/2018005.
Texto completoHéry, Michel. "Les impacts de l’automatisation du travail". Études Septembre, n.º 9 (22 de agosto de 2018): 43–54. http://dx.doi.org/10.3917/etu.4252.0043.
Texto completoHourenatou, H. "La pratique de l’intelligence economique dans les entreprises au Cameroun : Enjeux et perspectives". Journal of the Cameroon Academy of Sciences 15, n.º 3 (4 de agosto de 2020): 181–92. http://dx.doi.org/10.4314/jcas.v15i3.4.
Texto completoBawè, LD y Et Al. "Prévalence des marqueurs infectieux chez les donneurs de sang au centre régional de transfusion sanguine de Sokodé". Revue Malienne d'Infectiologie et de Microbiologie 18, n.º 2 (8 de enero de 2024): 26–32. http://dx.doi.org/10.53597/remim.v18i2.2731.
Texto completoBabio, Soumanou, Alexis Hougni y Jacob Afouda Yabi. "Sécurité Alimentaire au Bénin: Les Grandes Familles de Pratiques Agro-écologiques Adoptées dans les Zones Cotonnières". European Scientific Journal, ESJ 19, n.º 12 (29 de abril de 2023): 32. http://dx.doi.org/10.19044/esj.2023.v19n12p32.
Texto completoYEGBEMEY, Rosaine Nérice, Soule El-hadj IMOROU, Dossou Ghislain Boris AÏHOUNTON, Jacob Afouda YABI, Thierry A. KINKPE y Michel ATCHIKPA. "Déterminants de l’adaptation des agriculteurs aux changements climatiques dans les zones du Nord Bénin et du Sud Niger". Annales de l’Université de Parakou - Série Sciences Naturelles et Agronomie 10, n.º 2 (31 de diciembre de 2020): 31–42. http://dx.doi.org/10.56109/aup-sna.v10i2.35.
Texto completoBouras, Samir. "Oncological outcomes of partial nephrectomy". Batna Journal of Medical Sciences (BJMS) 8, n.º 1 (4 de junio de 2021): 9–12. http://dx.doi.org/10.48087/bjmsoa.2021.8102.
Texto completoTesis sobre el tema "Logiciel de sécurité"
Duc, Guillaume. "Support matériel, logiciel et cryptographique pour une éxécution sécurisée de processus". Télécom Bretagne, 2007. http://www.theses.fr/2007TELB0041.
Texto completoThe majority of the solutions to the issue of computer security (algorithms, protocols, secure operating systems, applications) are running on insecure hardware architectures that may be vulnerable to physical (bus spying, modification of the memory content, etc. ) or logical (malicious operating system) attacks. Several secure architectures, which are able to protect the confidentiality and the correct execution of programs against such attacks, have been proposed for several years. After the presentation of some cryptographic bases and a review of the main secure architectures proposed in the litterature, we will present the secure architecture CryptoPage. This architecture guarantees the confidentiality of the code and the data of applications and the correct execution against hardware or software attacks. In addition, it also includes a mechanism to reduce the information leakage on the address bus, while keeping reasonable performances. We will also study how to delegate some security operations of the architecture to an untrusted operating system in order to get more flexibility but without compromising the security of thearchitecture. Finally, some other important mechanism are studied: encrypted processid entification, attestations of the results, management of software signals, management of the threads, inter-process communication
Ayrault, Philippe. "Développement de logiciel critique en FoCalize : méthodologie et outils pour l'évaluation de conformité". Paris 6, 2011. http://www.theses.fr/2011PA066120.
Texto completoPorquet, Joël. "Architecture de sécurité dynamique pour systèmes multiprocesseurs intégrés sur puce". Phd thesis, Université Pierre et Marie Curie - Paris VI, 2010. http://tel.archives-ouvertes.fr/tel-00574088.
Texto completoHumbert, Sophie. "Déclinaison d'exigences de sécurité, du niveau système vers le niveau logiciel, assistée par des modèles formels". Bordeaux 1, 2008. http://www.theses.fr/2008BOR13580.
Texto completoKouadri, Mostéfaoui Ghita. "Vers un cadre conceptuel et logiciel intégrant la sécurité basée sur le contexte dans les environnements pervasifs". Paris 6, 2004. http://www.theses.fr/2004PA066392.
Texto completoBulusu, Sravani Teja. "Méthodologie d'ingénierie des exigences de sécurité réseau". Thesis, Toulouse 3, 2019. http://www.theses.fr/2019TOU30084.
Texto completoBuilding secure networks is crucial as well as challenging for any organization. Network security majorly concerns the security architectural needs that describe network segmentation (i.e., security zoning); security of network devices connecting the communicating end user systems; and security of the information being transferred across the communication links. Most often, a late consideration of security aspects (i.e., post-deployment of network design) inevitably results in an increase in costs as well as in the complexity to take into account the necessary changes that have be made to the existing infrastructures. In this regard, network security requirements hold a paramount importance since they drive the decisions related to the implementation of security controls about business needs. Indeed, bad network security requirements can lead to ineffective and costly security or worth security holes in the network security design. Nevertheless, current security requirement engineering methodologies render no support to derive network security requirements. This thesis work is a part of the research project DGA IREHDO2 (Intégration REseau Haut Débit embarqué Optique 2ème phase) that concerns aircrafts future generation networks. Our work is done mainly in collaboration with AIRBUS and is related to the security requirements engineering process for aircraft networks. Our objective in this project is to propose an SRE methodology for capturing and analysing network security requirements, and that facilitates the refinement into network security and monitoring configurations (TOP/DOWN approach). The complexity addressed comes at a time from the differences in point of view: i) with regard to the understanding of the issue of security by different stakeholders, ii) the nature of the systems impacted and the variability of the levels of abstraction in the network development cycle. In this work, we defined SRE methodology based on the abstraction levels proposed by SABSA (Sherwood Applied Business Security Architecture) method in order to structure the refinement activity of business needs into network security requirements. Indeed, SABSA recommends the expression of the needs considering the Business view (decision makers), Architect's view (objectives, risks, processes, applications and interactions), Designer's view (security services), Builder's view (security mechanisms) and Tradesman's view (products, tools, technologies). We considered the first three views. We express the business and architect's views using STS (Social-Technical Systems) formalism. We also propose to represent attacks as multi-agent systems to facilitate the analysis of security risks at these first two views. For expressing the network security requirements captured at Designer's view, we propose a methodology that automates parts of the process of security zoning and network security requirements elicitation using a definite set of formalized rules derived from security design principles and formal integrity models. We developed a tool that implements these rules in ASP (Answer set programming), which facilitates calculating cost-optimal security zone models. In the end, to ensure traceability between the three views, we defined a new modelling notation based on the concepts proposed in KAOS (Keep All Objectives Satisfied) and STS. We illustrate our methodology using a scenario specific to the IRHEDO2 project. Finally, we evaluate our methodology using: 1) an e-commerce enterprise case study; 2) a new scenario specific to the IRHEDO2 project
Mahmalgi, Ammar. "Étude et réalisation d'un testeur de logiciel pour microcontrôleur : contribution à la mise en sécurité d'un système microprogramme". Lille 1, 1987. http://www.theses.fr/1987LIL10088.
Texto completoChollet, Stéphanie. "Orchestration de services hétérogènes et sécurisés". Grenoble 1, 2009. http://www.theses.fr/2009GRE10283.
Texto completoService-oriented Computing (SOC) has appeared recently as a new software engineering paradigm. The very purpose of this reuse-based approach is to build applications through the late composition of independent software elements, called services, which are made available at run-time by internal or external providers. SOC brings properties of major interest. First, it supports rapid application development. Using existing, already tested, services is likely to reduce the time needed to build up an application and the overall quality of this application. SOC also improves software flexibility through late binding. A service to be used by an application is chosen at the last moment, based on its actual availability and on its properties at that moment. The service orientation has also to face thorny problems, as in any reuse-based approach. In this work, we focus on two major issues: the integration of heterogeneous service-oriented technologies and the management of security aspects when invoking a service. Security is actually a major concern to SOC practitioners. SOC technologies have allowed companies to expose applications, internally and externally, and, for that reason are heavily used. However, in some distributed environments, software services and process engines can be alarmingly vulnerable. Service-based processes can expose organizations to a considerable amount of security risk and dependability degradation. We propose to use a model-driven approach for solving this problem. During system design, paradigms such as abstraction, separation of concerns and language definition are used to define a model of the service composition with security properties. This model is transformed into an execution model. We present a generative environment applying these principles for service composition. This environment has been built as part of the SODA European project and validated on several industrial use cases
Mouelhi, Tejeddine. "Modélisation et test de mécanismes de sécurité dans des applications internet". Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-00544431.
Texto completoParrend, Pierre. "Software security models for service-oriented programming (SOP) platforms". Lyon, INSA, 2008. http://theses.insa-lyon.fr/publication/2008ISAL0117/these.pdf.
Texto completoLes plates-formes à composants de service (SOP pour Service-oriented Programming) sont des environnements d’exécution génériques qui garantissent des applications conçues selon un modèle architectural propre. Cependant, peu d’outils existent pour garantir l’innocuité des composants installés. Nous proposons par conséquent d’adapter les méthodes d’Assurance de Sécurité Logicielle pour les plates-formes SOP, d’effectuer une analyse de sécurité correspondante et de fournir des mécanismes de protection adaptés. Les mécanismes de protection proposés sont OSGi Robuste (Hardened OSGi), un ensemble de recommandations pour l’implémentation de plates-formes OSGi, CBAC (Component-based Access Control), un mécanisme de contrôle d’accès flexible mis en œuvre à l’installation, et WCA (Weak Component Analysis) qui identifie les vulnérabilités exploitables dans les composants SOP selon l’exposition du code. CBAC et WCA utilisent l’analyse statique du Bytecode pour automatiser la validation des composants lors de leur installation
Libros sobre el tema "Logiciel de sécurité"
Lucas, Michael. PGP & GPG: Assurer la confidentialite de son courrier e lectronique. Paris: E ditions Eyrolles, 2006.
Buscar texto completoLucas, Michael. PGP & GPG: Email for the practical paranoid. San Francisco, CA: No Starch Press, 2006.
Buscar texto completoLucas, Michael. PGP & GPG: Assurer la confidentialité de son courrier électronique. Paris: Eyrolles, 2006.
Buscar texto completoSecrets and lies: Digital security in a networked world. New York: John Wiley, 2000.
Buscar texto completoModsecurity handbook. 2a ed. London: Feisty Duck, 2010.
Buscar texto completoEuropean Dependable Computing Conference (1st 1994 Berlin, Germany). Dependable computing--EDCC-1: First European Dependable Computing Conference, Berlin, Germany, October 4-6, 1994 : proceedings. Berlin: Springer-Verlag, 1994.
Buscar texto completo1937-, Laurie Peter, ed. Apache: The definitive guide. 2a ed. Beijing: O'Reilly, 1999.
Buscar texto completo1937-, Laurie Peter, ed. Apache: The definitive guide. Cambridge [Mass.]: O'Reilly & Associates, Inc., 1997.
Buscar texto completo1937-, Laurie Peter, ed. Apache: The Definitive Guide. 3a ed. Sebastopol, CA: O'Reilly, 2003.
Buscar texto completo1970-, Amyot Daniel y Williams Alan W, eds. System analysis and modeling: 4th international SDL and MSC workshop, SAM 2004, Ottawa, Canada, June 1-4, 2004 : revised selected papers. Berlin: Springer, 2005.
Buscar texto completoCapítulos de libros sobre el tema "Logiciel de sécurité"
"Déni de service et l’attaque ReDoS". En La sécurité logicielle: une approche défensive, 211–34. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.9.
Texto completo"Table of Contents". En La sécurité logicielle: une approche défensive, VII—XII. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.2.
Texto completo"Index". En La sécurité logicielle: une approche défensive, 287–91. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.13.
Texto completo"La génération des nombres aléatoires". En La sécurité logicielle: une approche défensive, 133–72. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.7.
Texto completo"Études de cas". En La sécurité logicielle: une approche défensive, 255–84. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.11.
Texto completo"Le contrôle d’accès et la sécurité du système d’exploitation". En La sécurité logicielle: une approche défensive, 235–54. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.10.
Texto completo"Glossaire". En La sécurité logicielle: une approche défensive, 285–86. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.12.
Texto completo"Le buffer overflow ou « dépassement de tampon »". En La sécurité logicielle: une approche défensive, 55–132. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.6.
Texto completo"Principes de base de la sécurité de l’information". En La sécurité logicielle: une approche défensive, 15–54. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.5.
Texto completo"Front Matter". En La sécurité logicielle: une approche défensive, I—VI. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.1.
Texto completo