Literatura académica sobre el tema "Logiciel – Mesures de sûreté"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Logiciel – Mesures de sûreté".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Logiciel – Mesures de sûreté"
-LAPRIE, Jean-Claude. "Sûreté de fonctionnement du logiciel". Revue de l'Electricité et de l'Electronique -, n.º 10 (2005): 37. http://dx.doi.org/10.3845/ree.2005.090.
Texto completoOdier, Gabriel. "Rétention de sûreté : quelles mesures pour quelle politique criminelle ?" L'information psychiatrique 84, n.º 8 (2008): 721. http://dx.doi.org/10.3917/inpsy.8408.0721.
Texto completoOdier, Gabriel. "Rétention de sûreté : quelles mesures pour quelle politique criminelle ?" L'information psychiatrique Volume 84, n.º 8 (1 de octubre de 2008): 721–23. http://dx.doi.org/10.1684/ipe.2008.0380.
Texto completoIndjehagopian, Jean-Pierre y Sandrine Macé. "Mesures d'impact de promotion des ventes : Description et comparaison de trois méthodes". Recherche et Applications en Marketing (French Edition) 9, n.º 4 (diciembre de 1994): 53–79. http://dx.doi.org/10.1177/076737019400900403.
Texto completoBABANI, E. y T. PLACIDE. "UN LOGICIEL MÉTROLOGIQUE D'ANALYSE DE MESURES DE BRUIT : LEDBAR". Le Journal de Physique Colloques 51, n.º C2 (febrero de 1990): C2–911—C2–914. http://dx.doi.org/10.1051/jphyscol:19902212.
Texto completoAmer Dhaya, Sid Ahmed Ould Mohammed, Abdelkader Beyoud, Cheikh Sidi Ethmane kane, Driss Zejli y Mohammed Ahmed Ould Sid Ahmed. "Etude des données du vent et évaluation du potentiel éolien à Nouadhibou (Mauritanie)". Journal of Renewable Energies 20, n.º 3 (30 de septiembre de 2017): 511–20. http://dx.doi.org/10.54966/jreen.v20i3.645.
Texto completode Preux, Jean. "Texte de synthèse VIII — Conventions et Etats neutres". Revue Internationale de la Croix-Rouge 71, n.º 776 (abril de 1989): 132–43. http://dx.doi.org/10.1017/s0035336100013022.
Texto completoBanton, O., P. Lafrance y J. P. Villeneuve. "Evaluation de la vulnérabilité des eaux souterraines à la contamination par les pesticides. Une Application du Logiciel VULPEST dans la Région de Portneuf (Québec, Canada)". Water Quality Research Journal 24, n.º 1 (1 de febrero de 1989): 163–78. http://dx.doi.org/10.2166/wqrj.1989.009.
Texto completoLeuprecht, Christian y Todd Hataley. "Sûreté, sécurité civile et mesures d’urgence au sein du système canadien de gouvernance multiniveau". Télescope 19, n.º 1 (15 de julio de 2013): 176–93. http://dx.doi.org/10.7202/1017157ar.
Texto completoTaing, Kimnenh y Pierre Leclercq. "Adoption contextuelle des pratiques pédagogiques : entre écosystèmes physique et logiciel, le cas de l’architecture bioclimatique en Asie du sud-est". SHS Web of Conferences 147 (2022): 07002. http://dx.doi.org/10.1051/shsconf/202214707002.
Texto completoTesis sobre el tema "Logiciel – Mesures de sûreté"
Duc, Guillaume. "Support matériel, logiciel et cryptographique pour une éxécution sécurisée de processus". Télécom Bretagne, 2007. http://www.theses.fr/2007TELB0041.
Texto completoThe majority of the solutions to the issue of computer security (algorithms, protocols, secure operating systems, applications) are running on insecure hardware architectures that may be vulnerable to physical (bus spying, modification of the memory content, etc. ) or logical (malicious operating system) attacks. Several secure architectures, which are able to protect the confidentiality and the correct execution of programs against such attacks, have been proposed for several years. After the presentation of some cryptographic bases and a review of the main secure architectures proposed in the litterature, we will present the secure architecture CryptoPage. This architecture guarantees the confidentiality of the code and the data of applications and the correct execution against hardware or software attacks. In addition, it also includes a mechanism to reduce the information leakage on the address bus, while keeping reasonable performances. We will also study how to delegate some security operations of the architecture to an untrusted operating system in order to get more flexibility but without compromising the security of thearchitecture. Finally, some other important mechanism are studied: encrypted processid entification, attestations of the results, management of software signals, management of the threads, inter-process communication
Aussibal, Julien. "Rsids : un IDS distribué basé sur le framework CVSS". Pau, 2009. http://www.theses.fr/2009PAUU3044.
Texto completoIntrusion detection is a method that ensures the availability concept in systems and computer networks. This availability is generally undermined by various anomalies. These anomalies can be caused either legitimately unintended result has operations working on these systems (broken link, traffic, or. . . ), so illegitimate with malicious operations designed to undermine the availability of these systems. The implementation of these various anomalies detection tools, such as IDS (Intrusion Detection System), contribute to early identification of these anomalies and to block them. This thesis has enabled us to develop a new generation platform to generate legitimate and illegitimate anomalies. This work was carried out under the project METROSEC. This platform has enabled us to obtain various traffic captures containing these anomalies. The various illegimitate anomalies were performed with classic tools to make Denial of Service like TFN2k or Trinoo. Legitimate Anormalies were also conducted with flash crowd phenomenon. All these catch real traffic were used in further research on intrusion detection for the evaluation of new methods of detection. In a second part, the implementation of a new detection tool seems necessary to improve the quality of detection of these anomalies. This new distributed IDS, called RSIDS (Risk Scored Intrusion Detection System), will retrieve the results of a multitude of heterogeneous probes. The use of probes will remove the risk of false alarms. Indeed, a probe is not able to detect all anomalies that occur on a system or network. Each alert provided by its probes will be evaluated according to their degree of dangerousness. The assessment of dangerousness based on the framework CVSS (Common Vulnerability Scoring System)
Limane, Tahar. "Conception et réalisation d'un outil de surveillance, temps réel, d'espaces de débattements de robots". Lyon, INSA, 1991. http://www.theses.fr/1991ISAL0093.
Texto completoThe study presented in this report addresses the problems of designing and implementing a real-time control system of robots movements. The top-Level objective of the study is to enhance the safety of both the human operators and the machines. We begin with a global analysis of risk conditions in Robotics and general relationship statements between the different factors which have to be taken into account when specifying protection systems. We survey the different methods as well as the different equipments used in protection systems against robots possibly undue clearances. Constraints specification of a mean safety system able to control dynamically the robot's containment within the limits allowed or forbidden spaces are studied. Afterwards, we present the functional and structural specifications a well as the conceptual models of the protection systems to be implemented. Methodological approaches of software engineering type are proposed in view of validating the overall system life-cycle, its quality and its reliability. This study results the elaboration of the software tool SAFE (Surveillance d'Ateliers Flexibles et de Leur environnement) which is described in the report. Further developments of SAFE are suggested concerning, particularly, two inter-related functionalities of safety control : - first, the robot command program itself, - second, the dynamic re-specification of safety space when any change arises in the robot's task
Abdelnur, Humberto Jorge. "Gestion de vulnérabilités voix sur IP". Thesis, Nancy 1, 2009. http://www.theses.fr/2009NAN10005/document.
Texto completoVoIP networks are in a major deployment phase and are becoming widely accepted due to their extended functionality and cost efficiency. Meanwhile, as VoIP traffic is transported over the Internet, it is the target of a range of attacks that can jeopardize its proper functionality. Assuring its security becomes crucial. Among the most dangerous threats to VoIP, failures and bugs in the software implementation will continue rank high on the list of vulnerabilities. This thesis provides three contributions towards improving software security. The first is a VoIP specific security assessment framework integrated with discovery actions, data management and security attacks allowing to perform VoIP specific assessment tests. The second contribution consists in an automated approach able to discriminate message signatures and build flexible and efficient passive fingerprinting systems able to identify the source entity of messages in the network. The third contribution addresses the issue of detecting vulnerabilities using a stateful fuzzer. It provides an automated attack approach capable to track the state context of a target device and we share essential practical experience gathered over a two years period in searching for vulnerabilities in the VoIP space
Galissant, Pierre. "Contributions to white-box cryptography : models and algebraic constructions". Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPASG099.
Texto completoDue to the democratization of technologiessuch as mobile payment or the soaring of blockchaintechnologies, there is a growing need for secureimplementations of standardized algorithms in thewhite-box model. In spite of this, there are too fewsecure designs published in the literature. To avoidrelying on hidden design implementations to provideany security in the white-box model, moreimplementations designs and techniques have to beexplored.This thesis begins with a guide to white-boxcryptography. Its goal is to revise, precise or correctwhite-box models, security notions andconstructions that have emerged in the state of theart since the introduction of the concept. We notablyclarify the Remote-Access White-Box model and theHardware Module White-Box and contextualize themin the general cryptographic literature.We then explore white-box implementations of theAES by first synthesizing the knownimplementations techniques and their flaws, andthen proposing a new solution based on polynomialrepresentations, for which we propose a securityanalysis and a challenge implementation. The lastpart of this thesis focuses on the implementation ofmultivariate cryptographic primitives in thewhite-box model. After introducing succinctlymultivariate cryptography, we motivate the studyof this branch of public key cryptography in thewhite-box context. We propose the firstimplementation technique of the HFE family ofsignature algorithms, for which we propose anextensive security analysis and a challengeimplementation. Finally, to propose otherperspectives on multivariate white-boxcryptography, we also propose an incompressiblestream cipher adapted from QUAD
Le, Blond Stevens. "Est-ce que la vie privée existe toujours (dans les réseaux pair-à-pair) ?" Nice, 2011. http://www.theses.fr/2011NICE4018.
Texto completoWith the Peer-to-peer (P2P) paradigm, each user shares some of his resources (e. G. , storage and bandwidth) to provide a service. Because a P2P system scales with its number of users, the P2P paradigm is today used by some of the most popular Internet systems. However, P2P systems on the Internet may allow a malicious user to correlate the IP address of other participants with some personal information, possibly introducing a major privacy invasion. To evaluate the severity of this threat, we run privacy attacks against three popular P2P applications: a filesharing application (BitTorrent), a real-time application (Skype), and a low-latency anonymity application (Tor). (a) Exploiting Skype, we show that one can associate the identity (e. G. , birth name and city of residence) of a person with his IP address. We then scale this attack to track the mobility and filesharing behavior of a large number of identified-targeted users. (b) Exploiting BitTorrent, we demonstrate that an adversary can continuously spy on the download of most of the BitTorrent users of the Internet, from a single machine. We also show that it is possible to determine the IP address of the users who inject new content and that the top100 of these users inject 1/3 of all content. (c) Exploiting Tor, we show that it is possible to reveal the IP address of, or trace, supposedly anonymous users and show that Tor's design can also be exploited to trace a significant amount of non-P2P ``anonymous'' traffic. We conclude that P2P applications enable a major invasion in users' privacy and sketch an architecture that could alleviate this threat
Hodique, Yann. "Sûreté et optimisation par les systèmes de types en contexte ouvert et contraint". Lille 1, 2007. https://pepite-depot.univ-lille.fr/LIBRE/Th_Num/2007/50376-2007-15.pdf.
Texto completoTrouessin, Gilles. "Traitements fiables de données confidentielles par fragmentation-redondance-dissémination". Toulouse 3, 1991. http://www.theses.fr/1991TOU30260.
Texto completoJacob, Grégoire. "Malware behavioral models : bridging abstract and operational virology". Rennes 1, 2009. http://www.theses.fr/2009REN1S204.
Texto completoCette thèse s'intéresse à la modélisation des comportements malicieux au sein des codes malveillants, communément appelés malwares. Les travaux de thèse s'articulent selon deux directions, l'une opérationnelle, l'autre théorique. L'objectif à terme est de combiner ces deux approches afin d'élaborer des méthodes de détection comportementales couvrant la majorité des malwares existants, tout en offrant des garanties formelles de sécurité contre ceux susceptibles d'apparaître. L'approche opérationnelle introduit un langage comportemental abstrait, décorrélé de l'implémentation. Le langage en lui-même repose sur le formalisme des grammaires attribuées permettant d'exprimer la sémantique des comportements. A l'intérieur du langage, plusieurs descriptions de comportements malicieux sont spécifiées afin de construire une méthode de détection multicouche basée sur le parsing. Sur la base de ce même langage, des techniques de mutation comportementale sont également formalisées à l'aide de techniques de compilation. Ces mutations se révèlent un outil intéressant pour l'évaluation de produits antivirus. L'approche théorique introduit un nouveau modèle viral formel, non plus basé sur les paradigmes fonctionnels, mais sur les algèbres de processus. Ce nouveau modèle permet la description de l'auto-réplication ainsi que d'autres comportements plus complexes, basés sur les interactions. Il supporte la redémonstration de résultats fondamentaux tels que l'indécidabilité de la détection et la prévention par isolation. En outre, le modèle supporte la formalisation de plusieurs techniques existantes de détection comportementale, permettant ainsi d'évaluer formellement leur résistance
Boisseau, Alexandre. "Abstractions pour la vérification de propriétés de sécurité de protocoles cryptographiques". Cachan, Ecole normale supérieure, 2003. https://theses.hal.science/tel-01199555.
Texto completoSince the development of computer networks and electronic communications, it becomes important for the public to use secure electronic communications. Cryptographic considerations are part of the answer to the problem and cryptographic protocols describe how to integrate cryptography in actual communications. However, even if the encryption algorithms are robust, there can still remain some attacks due to logical flaw in protocols and formal verification can be used to avoid such flaws. In this thesis, we use abstraction techniques to formally prove various types of properties : secrecy and authentication properties, fairness properties and anonymity
Libros sobre el tema "Logiciel – Mesures de sûreté"
Highland, Harold Joseph. Comment protéger votre micro: Matériel et logiciel : protection et confidentialité en micro-informatique. Paris: Masson, 1985.
Buscar texto completoFaith, Cranor Lorrie y Garfinkel Simson, eds. Security and Usability: Designing Secure Systems That People Can Use. Beijing: O'Reilly, 2005.
Buscar texto completoPaget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Paris: Dunod, 2005.
Buscar texto completoHansteen, Peter N. M. Le livre de PF: Packet filter. Paris: Eyrolles, 2009.
Buscar texto completoSecrets and lies: Digital security in a networked world. New York: John Wiley, 2000.
Buscar texto completoSurfez sans risque : protégez votre ordinateur: Virus, spywares, chevaux de Troie, pirates, spam. Nantes, France: Éditions ENI, 2005.
Buscar texto completoGiovanni, Vigna, ed. Mobile agents and security. Berlin: Springer, 1998.
Buscar texto completoCanada. Approvisionnements et services Canada. Manuel de la sécurité industrielle. Ottawa, Ont: Ministre des approvisionnements et services Canada, 1992.
Buscar texto completoL' entreprise aux aguets: Information, surveillance de l'environnement, propriété et protection industrielles, espionnage et contre-espionnage au service de la compétitivité. Paris: Masson, 1990.
Buscar texto completoJan, Christophe. La sécurité informatique. Paris: Eyrolles, 1989.
Buscar texto completoCapítulos de libros sobre el tema "Logiciel – Mesures de sûreté"
Van de Kerchove, Michel. "Chapitre III. Des mesures répressives aux mesures de sûreté et de protection. Réflexions sur le pouvoir mystificateur du langage". En Sens et non-sens de la peine, 95–155. Presses de l’Université Saint-Louis, 2009. http://dx.doi.org/10.4000/books.pusl.23283.
Texto completoActas de conferencias sobre el tema "Logiciel – Mesures de sûreté"
Leveau, P. "Impact de mesures organisationnelles sur l’analyse des dangers d’un pôle urgence". En Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56234.
Texto completoDutfoy, A. y M. Baudin. "Open TURNS, logiciel Open source pour le traitement des incertitudes dans un contexte industriel". En Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56164.
Texto completoMihalache, A. y F. Bedoucha. "Norme ISO 26262 : application sur le logiciel du Boitier de Servitude Intelligent (BSI) de PSA". En Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56194.
Texto completoMihalache, Alin, Fabrice Bedoucha, Yann-Mikaël Foll y Matthieu Foucault. "Assurer la SdF d'un logiciel existant ayant de nouvelles fonctionnalités spécifiées en Model Based Design". En Congrès Lambda Mu 20 de Maîtrise des Risques et de Sûreté de Fonctionnement, 11-13 Octobre 2016, Saint Malo, France. IMdR, 2016. http://dx.doi.org/10.4267/2042/61818.
Texto completoSehit, Mehdi, Annie Bracquemond, Hassan Soubra y Amar Ramdan Cherif. "Méthode d’évaluation des exigences de fiabilité pour des modules logiciel embarqués à partir de spécifications". En Congrès Lambda Mu 20 de Maîtrise des Risques et de Sûreté de Fonctionnement, 11-13 Octobre 2016, Saint Malo, France. IMdR, 2016. http://dx.doi.org/10.4267/2042/61842.
Texto completoDoyen, Laurent y Rémy Drouilhet. "VAM, outil logiciel adaptatif et libre pour prendre en compte l'effet des maintenances et du vieillissement". En Congrès Lambda Mu 20 de Maîtrise des Risques et de Sûreté de Fonctionnement, 11-13 Octobre 2016, Saint Malo, France. IMdR, 2016. http://dx.doi.org/10.4267/2042/61721.
Texto completoPajot, T., S. Ketoff y L. Bénichou. "Chirurgie implantaire guidée : acquisition, planification, modélisation et production d'un guide chirurgical. Mise en place d'une chaine numérique pour la création interne et l'utilisation de guides chirurgicaux". En 66ème Congrès de la SFCO. Les Ulis, France: EDP Sciences, 2020. http://dx.doi.org/10.1051/sfco/20206602006.
Texto completo