Literatura académica sobre el tema "Modèles de gestion de la confiance"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Modèles de gestion de la confiance".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Modèles de gestion de la confiance"
Tanguy, François. "La gestion des ressources humaines à la DGFiP, d’une gestion administrative à une approche personnalisée et prospective". Gestion & Finances Publiques, n.º 5 (septiembre de 2021): 74–82. http://dx.doi.org/10.3166/gfp.2021.5.012.
Texto completoMbassi, Jean-Claude y Richard Nkene Ndeme. "La mobilisation du « health belief model modifié » en communication publique peut-elle contribuer au changement de comportement en période de COVID-19 ?" Communication & management Vol. 20, n.º 2 (14 de febrero de 2024): 63–80. http://dx.doi.org/10.3917/comma.202.0063.
Texto completoKorahiré, Joël Awouhidia. "Dynamiques socioéconomiques dans les villages riverains au ranch de gibier de Nazinga au Burkina Faso". Articles 40, n.º 2 (24 de marzo de 2011): 53–70. http://dx.doi.org/10.7202/1001388ar.
Texto completoZahar, Y. y J. P. Laborde. "Une méthode stochastique pour la prédétermination des fluctuations probables des durées de service des réservoirs collinaires en Tunisie". Revue des sciences de l'eau 11, n.º 1 (12 de abril de 2005): 25–42. http://dx.doi.org/10.7202/705295ar.
Texto completoChênevert, Denis, Geneviève Jourdain y Marie-Claude Tremblay. "Les comportements de citoyenneté du personnel soignant : lorsque le sens et la confiance deviennent incontournables". Articles 68, n.º 2 (11 de junio de 2013): 210–38. http://dx.doi.org/10.7202/1016317ar.
Texto completoFolton, Nathalie y Patrick Arnaud. "Indicateurs sur la ressource en eau estimés par une modélisation pluie-débit régionalisée : la base de données Web LoiEau". La Houille Blanche, n.º 3 (junio de 2020): 22–29. http://dx.doi.org/10.1051/lhb/2020034.
Texto completoBeaumont, Julie y Carole Lavallée. "L’enseignant ressource : un prof qui parle aux profs". Développement Humain, Handicap et Changement Social 20, n.º 1 (28 de febrero de 2022): 21–29. http://dx.doi.org/10.7202/1086765ar.
Texto completoSritharan, Jeavana, Jill S. MacLeod, Christopher B. McLeod, Alice Peter y Paul A. Demers. "Risque de cancer de la prostate par profession dans le Système de surveillance des maladies professionnelles de l’Ontario, Canada". Promotion de la santé et prévention des maladies chroniques au Canada 39, n.º 5 (mayo de 2019): 195–205. http://dx.doi.org/10.24095/hpcdp.39.5.02f.
Texto completoCusack, Sandra y Wendy Thompson. "Building a Community of Leaders: Research and Development of A Program to Train Seniors as Empowering Leaders". Canadian Journal for the Study of Adult Education 10, n.º 2 (1 de noviembre de 1996): 19–36. http://dx.doi.org/10.56105/cjsae.v10i2.2071.
Texto completoMassoni, Sébastien. "Confiance, métacognition et perception". Articles 92, n.º 1-2 (11 de mayo de 2017): 459–85. http://dx.doi.org/10.7202/1039885ar.
Texto completoTesis sobre el tema "Modèles de gestion de la confiance"
Abidi, Rihab. "Smart Rοad Signs based trust management mοdels fοr cοοperative Ιntellgent Τranspοrtatiοn Systems". Electronic Thesis or Diss., Normandie, 2024. http://www.theses.fr/2024NORMR111.
Texto completoThe increasing complexity of urban traffic systems has made congestion a significant challenge, leading to severe economic, environmental, and social impacts. Intelligent Transportation Systems (ITSs) have emerged as a promising solution to mitigate these challenges by enabling dynamic traffic management. However, the reliability of data within ITSs represents an increasingly significant challenge. The introduction of erroneous data by defective or malicious sensors can lead to malfunctions or intentional disruptions of the system. In this context, trust management models assume a crucial importance.Most of the existing trust models propose vehicle-centric approaches. However, the high mobility and dynamic nature of the ITS environments affects the stability and scalabity of such systems. Accordingly, proposing novel trust models designed specifically for ITSs to enhance the accuracy, security, scalability and stabilty of traffic information dissemination constitutes the overall goal of this thesis.First, we proposed a generic architecture for a trust framework, leveraging Smart Road Signs (SRSs). The conception of this architecture was built upon the output of a deep investigation of the state of the art. This framework has been, then, developed to propose two novel trust models. The first model, considers the contextual information and multi-source data aggregation to assess the trustworthiness of reported traffic events and the different nodes of the network. Additionally, the model applies a bi-level trust evaluation combining Bayesian Inference and a dynamic weighted sum approach. Furthermore, a predictive-based Baysian Inference was proposed to enhance the accuracy of trust evaluation. Thereafter, a communication trust model was proposed, to complement the previous contribution, using Quality of Service (QoS) metrics to evaluate the SRSs behaviour. This model introduces a self-organizing trust model to track the SRSs' behaviours and establishes stable environments using a fuzzy-based Dempster Shafer Theory (DST). In fact, we consider a more realistic scenario where all the nodes are vulnerable to attacks and failure. Thus, the main objective of this model is to ensure that the system remains operational even in hostile environments, by mitigating the inherent single point of failure vulnerability characteristic of centralized network architectures.\\The proposed models were validated through simulations, showing their effectiveness in identifying malicious nodes and mitigating erroneous traffic reports. The results demonstrate that considering multi-source data aggregation and context-aware information increases the accuracy of trust evaluation. Furthermore, the adoption of an infrastructure-based framework leveraging a decentralized and hierarchical architecture enhances the scalability and stability of the trust models, which is suitable for such environment
Fragoso, Rodriguez Uciel. "Modèle de respect de la vie privée dans une architecture d'identité fédérée". Phd thesis, Institut National des Télécommunications, 2009. http://tel.archives-ouvertes.fr/tel-00541850.
Texto completoBradai, Amira. "Secured trust and reputation system : analysis of malicious behaviors and optimization". Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0019/document.
Texto completoReputation mechanisms offer a novel and effective way of ensuring the necessary level of trust which is essential to the functioning of any critical system. They collect information about the history (i.e., past transactions) of participants and make public their reputation. Prospective participants guide their decisions by considering reputation information, and thus make more informative choices. Online reputation mechanisms enjoy huge success. They are present in most e-commerce sites available today, and are seriously taken into consideration by human users. Existing reputation systems were conceived with the assumption that users will share feedback honestly. But, such systems like those in peer to peer are generally compromise of malicious users. This leads to the problem in cooperation, aggregation and evaluation. Some users want to use resources from network but do not want to contribute back to the network. Others manipulate the evaluations of trust and provide wrong estimation. We have recently seen increasing evidence that some users strategically manipulate their reports and behave maliciously. For proper protecting against those users, some kind of reputation management system is required. In some system, a trusted third entity exists and can aggregate the information. However, Peer-to-peer networks don’t have any central control or repository. Large size of distributed and hybrid networks makes the reputation management more challenging task. Hence reputation management system should perform all the tasks in distributed fashion. When these kinds of systems are implemented, peers try to deceive them to take maximum advantage. This thesis describes ways of making reputation mechanisms more trustworthy and optimized by providing defense mechanism and analysis. Different kinds of malicious behaviors exist and for each one, we present a complete analysis, simulation and a real use case example in distributed and non-distributed way
Bradai, Amira. "Secured trust and reputation system : analysis of malicious behaviors and optimization". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0019.
Texto completoReputation mechanisms offer a novel and effective way of ensuring the necessary level of trust which is essential to the functioning of any critical system. They collect information about the history (i.e., past transactions) of participants and make public their reputation. Prospective participants guide their decisions by considering reputation information, and thus make more informative choices. Online reputation mechanisms enjoy huge success. They are present in most e-commerce sites available today, and are seriously taken into consideration by human users. Existing reputation systems were conceived with the assumption that users will share feedback honestly. But, such systems like those in peer to peer are generally compromise of malicious users. This leads to the problem in cooperation, aggregation and evaluation. Some users want to use resources from network but do not want to contribute back to the network. Others manipulate the evaluations of trust and provide wrong estimation. We have recently seen increasing evidence that some users strategically manipulate their reports and behave maliciously. For proper protecting against those users, some kind of reputation management system is required. In some system, a trusted third entity exists and can aggregate the information. However, Peer-to-peer networks don’t have any central control or repository. Large size of distributed and hybrid networks makes the reputation management more challenging task. Hence reputation management system should perform all the tasks in distributed fashion. When these kinds of systems are implemented, peers try to deceive them to take maximum advantage. This thesis describes ways of making reputation mechanisms more trustworthy and optimized by providing defense mechanism and analysis. Different kinds of malicious behaviors exist and for each one, we present a complete analysis, simulation and a real use case example in distributed and non-distributed way
Pinto, Coelho Joaquim José Vieira. "Les facteurs psychosociaux de l'efficacité organisationnelle : étude comparée des mairies portugaises". Metz, 2004. http://docnum.univ-lorraine.fr/public/UPV-M/Theses/2004/Pinto_Coelho.Joaquim.Jose.Vieira.LMZ0408_1.pdf.
Texto completoThis research required to examine variables that influence the organizational efectiveness in local government services. The mayoralty was used the unity of analysis and 92 mayors and 236 directors in 109 municipalities in Portugal participated in this study. The latent variables mayor's extensive leadership (G), strategic oriented leadership (S) and risk predisposed leadership R, director's satifaction and commitment, trust and cooperation climate were operationalized using factor analysis. Through structural equations modeling the research revealed significant positive mediate relationship between : G and satifaction, G and cooperation, S and commitment, S and trust, R and satisfaction, satisfaction and commitment and commitment and trust. Signicant negative mediate relatinship was found between G and commitment ; and a one hand, between R and, on the other, trust and cooperation. Direct effects from trust to overall perceived effectiveness and to level of investments execution rate were found. Financial indicators were not found to be significantly explained by the model. Significant differences for mayors and directors were found in the relation between G and satisfaction, R and satisfaction, S end trust and commitment and trust. Mayoralties supported by right and left ideologies were found to have significantly different perceptions between R and cooperation. Also, significant differences for lower and upper economic level municipalities were found between R satifaction and between R and cooperation. Behavioral styles of mayor are proposed and analyzed their effectiveness. The model was specified for others factors of leadership as perceived by the directors
Chaulet, Johann. "La confiance médiatisée : la confiance et sa gestion au sein des communications médiatisées". Toulouse 2, 2007. https://hal.archives-ouvertes.fr/tel-01252308.
Texto completoThis thesis is about the usages of mediated communication devices. Its aim is to understand how their generalization renews the way people “equip” and deal with their trust relationships. This interest for the notion of trust leads us to place the questions of information, availability, commitment and surveillance in the center of our analysis. Due to the pertinence of this broadening the study of “close relationships” has been complemented by relations centered around a specific goal (via the study of internet connecting websites) and contractual relationships in very equipped work places (in call centers). The diversity of these situations allows us to examine the confrontation of the two main concepts of mediation and trust. It seems that, if these mediations don't change the main grounds of trust, they do modify some aspects of relations to others and the uncertainty they imply. Our findings document the hypothesis of growing rationalization of communication and relational practices based, mainly, on new information that those always more numerous mediations produce
Vu, Van-Hoan. "Infrastructure de gestion de la confiance sur internet". Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2010. http://tel.archives-ouvertes.fr/tel-00611839.
Texto completoMasmoudi, Khaled. "Gestion de la confiance dans les réseaux personnels". Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0002.
Texto completoWith the advent of new networking paradigms and evolutions, spanning from distributed and self-organized systems such as ad hoc networks, P2P networks or grids, to pervasive computing, wireless mesh networks or embedded devices, many research effort have been conducted to bring the previous theoretic concepts into real life. Security protocols have to fulfill a new requirement : how is it possible to establish trust between parties without any a priori credential, central administration or shared context ? We go even farther in this dissertation : what if each single party was a heterogeneous distributed domain ? This thesis builds a layered architecture with a set of cryptographic protocols, meant to establish trust between devices and services belonging to different users through their Personal Networks. In the first part, the trust vector is an out-of-band channel, based on proximity. The resulting protocols combine identity-based cryptography to link identities to cryptographic material, and cryptographically-generated addresses to provide identity ownership. These new identifiers form a novel namespace that allows cross-layer trust establishment. The de facto security negotiation protocols, namely Internet Key Exchange protocol and Transport layer Security handshake sub-protocol, provide end-to-end secure tunnel establishment, but fail to fit scenarios when a domain controller has to define the security parameters for a device under its supervision. We define in the second part of this dissertation how extensions could be applied to fullfill the previous requirement and delegate tunnel negotiation to a third party. Security validation results and the details of a preliminary implementation are also provided. Last, we design a framework for establishing trust basing on the entity behavior within a group of Personal Networks that share a part of their devices and services. Focusing on service discovery, we show that reputation-based trust can be applied to mitigate selfishness and fake announcements in a federation of Personal Networks
Ould, yahia Youcef. "Proposition d’un modèle de sécurité pour la protection de données personnelles dans les systèmes basés sur l’internet des objets". Thesis, Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1242/document.
Texto completoInternet of Things (IoT) and IT service outsourcing technologies have led to the emergence of new threats to users' privacy. However, the implementation of traditional security measures on IoT equipment is a first challenge due to capacity limitations. On the other hand, the offloading of data processing and storage poses the problem of trust in service providers.In this context, we have proposed an encryption solution that provides owner-centric data protection adapted to the constraining environment of IoT. This model is based on attribute-based encryption with secure offloading capability and Blockchain technology. Then, in response to the issue of trust and service selection, we explored the possibilities offered by artificial intelligence tools. To do this, we proposed a collaborative filtering model based on Kohonen maps and efficient solution to detect the untrusted users
Evans, William. "Trust in Japanese management and culture". Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00873698.
Texto completoLibros sobre el tema "Modèles de gestion de la confiance"
Institut de socio-économie des entreprises et des organisations., ed. Confiance et gestion. Grenoble: Presses Universitaires de Grenoble, 1998.
Buscar texto completoRoss, André. Modèles mathématiques en gestion. Sainte-Foy: Le Griffon d'argile, 1987.
Buscar texto completoMarsland, Jane. Modèles de gestion souples: Rapport final. Ottawa, Ont: Conseil des arts du Canada, 2005.
Buscar texto completoVédrine, Jean-Pierre. Techniques quantitatives de gestion. Paris: Librairie Vuibert, 1985.
Buscar texto completoGalanos, Jean. Système d'information comptable et modèles de gestion émergents. Grenoble: A.N.R.T. Université Pierre Mendès France Grenoble 2, 1991.
Buscar texto completoKurpiel, Adam. Valorisation et gestion d'options: Modèles à volatilité stochastique. Grenoble: A.N.R.T, Université Pierre Mendes France (Grenoble II), 2000.
Buscar texto completoWidmer, Marino. Modèles mathématiques pour une gestion efficace des ateliers flexibles. Lausanne: Presses polytechniques et universitaires romandes, 1991.
Buscar texto completoLevesque, Aline A. Supervision et gestion: Essai sur le développement de modèles. Sudbury, Ont: École de Service Social, Université Laurentienne, 1997.
Buscar texto completoHamon, Jacques. Bourse et gestion de portefeuille. 2a ed. Paris: Economica, 2005.
Buscar texto completoCapítulos de libros sobre el tema "Modèles de gestion de la confiance"
Phalip, Bruno. "Une acculturation difficile. L’Auvergne féodale, ses modèles architecturaux, la romanité et l’intégration au royaume de France (XIIe-XIIIe siècles)". En Lieu de pouvoir, lieu de gestion, 7–17. Turnhout: Brepols Publishers, 2011. http://dx.doi.org/10.1484/m.stmh-eb.1.100035.
Texto completoGaussot, Ludovic y Nicolas Palierne. "Chapitre II. Gestion de l’information et gestion des consommations". En La confiance dans les relations familiales, 73–116. Presses universitaires de Rennes, 2020. http://dx.doi.org/10.4000/books.pur.148615.
Texto completo"LES MODÈLES DE GESTION MÉTROPOLITAINE:". En Penser métropolitain, 5–34. Presses de l'Université du Québec, 2012. http://dx.doi.org/10.2307/j.ctv18pgq3v.8.
Texto completo"Les Modèles de Gestion Métropolitaine". En Penser métropolitain?, 5–34. Presses de l'Université du Québec, 2012. http://dx.doi.org/10.1515/9782760534933-006.
Texto completoServant, Dominique. "Modèles explicatifs des psychothérapies". En Gestion du Stress et De L'anxiété, 23–39. Elsevier, 2012. http://dx.doi.org/10.1016/b978-2-294-71312-5.00002-8.
Texto completoServant, Dominique. "Médicaments et modèles neurobiologiques". En Gestion du Stress et De L'anxiété, 41–49. Elsevier, 2012. http://dx.doi.org/10.1016/b978-2-294-71312-5.00003-x.
Texto completoServant, Dominique. "Modèles explicatifs des psychothérapies". En Gestion du Stress et de L'anxiété, 23–42. Elsevier, 2022. http://dx.doi.org/10.1016/b978-2-294-77735-6.00002-1.
Texto completoServant, Dominique. "Médicaments et modèles neurobiologiques". En Gestion du Stress et de L'anxiété, 43–66. Elsevier, 2022. http://dx.doi.org/10.1016/b978-2-294-77735-6.00003-3.
Texto completo"LA GESTION DES STOCKS". En Modèles probabilistes d'aide à la décision, 223–90. Presses de l'Université du Québec, 1986. http://dx.doi.org/10.2307/j.ctv18pgvn2.7.
Texto completoServant, Dominique. "Concepts et modèles de l’anxiété". En Gestion du Stress et De L'anxiété, 1–22. Elsevier, 2012. http://dx.doi.org/10.1016/b978-2-294-71312-5.00001-6.
Texto completoActas de conferencias sobre el tema "Modèles de gestion de la confiance"
Sannino, Christian, Jonathan Sprauel y Christel Seguin. "Modèles dysfonctionnels pour la gestion de la qualité de service des systèmes critiques". En Congrès Lambda Mu 20 de Maîtrise des Risques et de Sûreté de Fonctionnement, 11-13 Octobre 2016, Saint Malo, France. IMdR, 2016. http://dx.doi.org/10.4267/2042/61853.
Texto completo"Formalisation des politiques de sécurité, gestion de la confiance, management de la sécurité". En 2012 National Days of Network Security and Systems (JNS2). IEEE, 2012. http://dx.doi.org/10.1109/jns2.2012.6249229.
Texto completoInformes sobre el tema "Modèles de gestion de la confiance"
Moran, Kevin, Dalibor Stevanovic y Adam Kader Touré. Confiance et activité économique : analyse d’impact sur l’économie canadienne. CIRANO, junio de 2023. http://dx.doi.org/10.54932/pamp8753.
Texto completoMoran, Kevin, Dalibor Stevanovic y Adam Kader Touré. Le pessimisme risque de nous plonger dans une récession. CIRANO, septiembre de 2023. http://dx.doi.org/10.54932/htmw1091.
Texto completoBeaurain, Christophe, Julien Bernard, Iratxe Calvo-Mendieta, Hervé Flanquart, Séverine Frère, Frédéric Gonthier, Anne-Peggy Hellequin y Antoine Le Blanc. Les risques et pollutions industriels sur le territoire dunkerquois: des perceptions à la «concertation». Fondation pour une culture de sécurité industrielle, julio de 2010. http://dx.doi.org/10.57071/255dkr.
Texto completoBordeleau, Raphaëlle, Mathilde Montpetit, Jade Jost, Régis Blais, Delphine Bosson-Rieutort, Géraldine Layani y Nadia Sourial. Quels seront les soins de santé de première ligne du futur ? Compte-rendu du 40e Colloque Jean-Yves Rivard. CIRANO, febrero de 2024. http://dx.doi.org/10.54932/oocl1335.
Texto completoJocelyn, Sabrina, Élise Ledoux, Damien Burlet-Vienney, Isabelle Berger, Isvieysys Armas Marrero, Chun Hong Law, Yuvin Chinniah et al. Identification en laboratoire des éléments essentiels au processus d’intégration sécuritaire de cellules cobotiques. IRSST, agosto de 2024. http://dx.doi.org/10.70010/qkwy4060.
Texto completoDudoit, Alain. Les espaces européens communs de données : une initiative structurante nécessaire et adaptable au Canada. CIRANO, octubre de 2023. http://dx.doi.org/10.54932/ryht5065.
Texto completoDans l'œil de l'Obvia - Vers une identité numérique au Québec : Enjeux et défis. Observatoire international sur les impacts sociétaux de l'intelligence artificielle et du numérique, mayo de 2024. https://doi.org/10.61737/dnfc4193.
Texto completoLes forêts françaises face au changement climatique. Académie des sciences, junio de 2023. http://dx.doi.org/10.62686/6.
Texto completo