Tesis sobre el tema "Modèles de gestion de la confiance"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "Modèles de gestion de la confiance".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Abidi, Rihab. "Smart Rοad Signs based trust management mοdels fοr cοοperative Ιntellgent Τranspοrtatiοn Systems". Electronic Thesis or Diss., Normandie, 2024. http://www.theses.fr/2024NORMR111.
Texto completoThe increasing complexity of urban traffic systems has made congestion a significant challenge, leading to severe economic, environmental, and social impacts. Intelligent Transportation Systems (ITSs) have emerged as a promising solution to mitigate these challenges by enabling dynamic traffic management. However, the reliability of data within ITSs represents an increasingly significant challenge. The introduction of erroneous data by defective or malicious sensors can lead to malfunctions or intentional disruptions of the system. In this context, trust management models assume a crucial importance.Most of the existing trust models propose vehicle-centric approaches. However, the high mobility and dynamic nature of the ITS environments affects the stability and scalabity of such systems. Accordingly, proposing novel trust models designed specifically for ITSs to enhance the accuracy, security, scalability and stabilty of traffic information dissemination constitutes the overall goal of this thesis.First, we proposed a generic architecture for a trust framework, leveraging Smart Road Signs (SRSs). The conception of this architecture was built upon the output of a deep investigation of the state of the art. This framework has been, then, developed to propose two novel trust models. The first model, considers the contextual information and multi-source data aggregation to assess the trustworthiness of reported traffic events and the different nodes of the network. Additionally, the model applies a bi-level trust evaluation combining Bayesian Inference and a dynamic weighted sum approach. Furthermore, a predictive-based Baysian Inference was proposed to enhance the accuracy of trust evaluation. Thereafter, a communication trust model was proposed, to complement the previous contribution, using Quality of Service (QoS) metrics to evaluate the SRSs behaviour. This model introduces a self-organizing trust model to track the SRSs' behaviours and establishes stable environments using a fuzzy-based Dempster Shafer Theory (DST). In fact, we consider a more realistic scenario where all the nodes are vulnerable to attacks and failure. Thus, the main objective of this model is to ensure that the system remains operational even in hostile environments, by mitigating the inherent single point of failure vulnerability characteristic of centralized network architectures.\\The proposed models were validated through simulations, showing their effectiveness in identifying malicious nodes and mitigating erroneous traffic reports. The results demonstrate that considering multi-source data aggregation and context-aware information increases the accuracy of trust evaluation. Furthermore, the adoption of an infrastructure-based framework leveraging a decentralized and hierarchical architecture enhances the scalability and stability of the trust models, which is suitable for such environment
Fragoso, Rodriguez Uciel. "Modèle de respect de la vie privée dans une architecture d'identité fédérée". Phd thesis, Institut National des Télécommunications, 2009. http://tel.archives-ouvertes.fr/tel-00541850.
Texto completoBradai, Amira. "Secured trust and reputation system : analysis of malicious behaviors and optimization". Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0019/document.
Texto completoReputation mechanisms offer a novel and effective way of ensuring the necessary level of trust which is essential to the functioning of any critical system. They collect information about the history (i.e., past transactions) of participants and make public their reputation. Prospective participants guide their decisions by considering reputation information, and thus make more informative choices. Online reputation mechanisms enjoy huge success. They are present in most e-commerce sites available today, and are seriously taken into consideration by human users. Existing reputation systems were conceived with the assumption that users will share feedback honestly. But, such systems like those in peer to peer are generally compromise of malicious users. This leads to the problem in cooperation, aggregation and evaluation. Some users want to use resources from network but do not want to contribute back to the network. Others manipulate the evaluations of trust and provide wrong estimation. We have recently seen increasing evidence that some users strategically manipulate their reports and behave maliciously. For proper protecting against those users, some kind of reputation management system is required. In some system, a trusted third entity exists and can aggregate the information. However, Peer-to-peer networks don’t have any central control or repository. Large size of distributed and hybrid networks makes the reputation management more challenging task. Hence reputation management system should perform all the tasks in distributed fashion. When these kinds of systems are implemented, peers try to deceive them to take maximum advantage. This thesis describes ways of making reputation mechanisms more trustworthy and optimized by providing defense mechanism and analysis. Different kinds of malicious behaviors exist and for each one, we present a complete analysis, simulation and a real use case example in distributed and non-distributed way
Bradai, Amira. "Secured trust and reputation system : analysis of malicious behaviors and optimization". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0019.
Texto completoReputation mechanisms offer a novel and effective way of ensuring the necessary level of trust which is essential to the functioning of any critical system. They collect information about the history (i.e., past transactions) of participants and make public their reputation. Prospective participants guide their decisions by considering reputation information, and thus make more informative choices. Online reputation mechanisms enjoy huge success. They are present in most e-commerce sites available today, and are seriously taken into consideration by human users. Existing reputation systems were conceived with the assumption that users will share feedback honestly. But, such systems like those in peer to peer are generally compromise of malicious users. This leads to the problem in cooperation, aggregation and evaluation. Some users want to use resources from network but do not want to contribute back to the network. Others manipulate the evaluations of trust and provide wrong estimation. We have recently seen increasing evidence that some users strategically manipulate their reports and behave maliciously. For proper protecting against those users, some kind of reputation management system is required. In some system, a trusted third entity exists and can aggregate the information. However, Peer-to-peer networks don’t have any central control or repository. Large size of distributed and hybrid networks makes the reputation management more challenging task. Hence reputation management system should perform all the tasks in distributed fashion. When these kinds of systems are implemented, peers try to deceive them to take maximum advantage. This thesis describes ways of making reputation mechanisms more trustworthy and optimized by providing defense mechanism and analysis. Different kinds of malicious behaviors exist and for each one, we present a complete analysis, simulation and a real use case example in distributed and non-distributed way
Pinto, Coelho Joaquim José Vieira. "Les facteurs psychosociaux de l'efficacité organisationnelle : étude comparée des mairies portugaises". Metz, 2004. http://docnum.univ-lorraine.fr/public/UPV-M/Theses/2004/Pinto_Coelho.Joaquim.Jose.Vieira.LMZ0408_1.pdf.
Texto completoThis research required to examine variables that influence the organizational efectiveness in local government services. The mayoralty was used the unity of analysis and 92 mayors and 236 directors in 109 municipalities in Portugal participated in this study. The latent variables mayor's extensive leadership (G), strategic oriented leadership (S) and risk predisposed leadership R, director's satifaction and commitment, trust and cooperation climate were operationalized using factor analysis. Through structural equations modeling the research revealed significant positive mediate relationship between : G and satifaction, G and cooperation, S and commitment, S and trust, R and satisfaction, satisfaction and commitment and commitment and trust. Signicant negative mediate relatinship was found between G and commitment ; and a one hand, between R and, on the other, trust and cooperation. Direct effects from trust to overall perceived effectiveness and to level of investments execution rate were found. Financial indicators were not found to be significantly explained by the model. Significant differences for mayors and directors were found in the relation between G and satisfaction, R and satisfaction, S end trust and commitment and trust. Mayoralties supported by right and left ideologies were found to have significantly different perceptions between R and cooperation. Also, significant differences for lower and upper economic level municipalities were found between R satifaction and between R and cooperation. Behavioral styles of mayor are proposed and analyzed their effectiveness. The model was specified for others factors of leadership as perceived by the directors
Chaulet, Johann. "La confiance médiatisée : la confiance et sa gestion au sein des communications médiatisées". Toulouse 2, 2007. https://hal.archives-ouvertes.fr/tel-01252308.
Texto completoThis thesis is about the usages of mediated communication devices. Its aim is to understand how their generalization renews the way people “equip” and deal with their trust relationships. This interest for the notion of trust leads us to place the questions of information, availability, commitment and surveillance in the center of our analysis. Due to the pertinence of this broadening the study of “close relationships” has been complemented by relations centered around a specific goal (via the study of internet connecting websites) and contractual relationships in very equipped work places (in call centers). The diversity of these situations allows us to examine the confrontation of the two main concepts of mediation and trust. It seems that, if these mediations don't change the main grounds of trust, they do modify some aspects of relations to others and the uncertainty they imply. Our findings document the hypothesis of growing rationalization of communication and relational practices based, mainly, on new information that those always more numerous mediations produce
Vu, Van-Hoan. "Infrastructure de gestion de la confiance sur internet". Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2010. http://tel.archives-ouvertes.fr/tel-00611839.
Texto completoMasmoudi, Khaled. "Gestion de la confiance dans les réseaux personnels". Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0002.
Texto completoWith the advent of new networking paradigms and evolutions, spanning from distributed and self-organized systems such as ad hoc networks, P2P networks or grids, to pervasive computing, wireless mesh networks or embedded devices, many research effort have been conducted to bring the previous theoretic concepts into real life. Security protocols have to fulfill a new requirement : how is it possible to establish trust between parties without any a priori credential, central administration or shared context ? We go even farther in this dissertation : what if each single party was a heterogeneous distributed domain ? This thesis builds a layered architecture with a set of cryptographic protocols, meant to establish trust between devices and services belonging to different users through their Personal Networks. In the first part, the trust vector is an out-of-band channel, based on proximity. The resulting protocols combine identity-based cryptography to link identities to cryptographic material, and cryptographically-generated addresses to provide identity ownership. These new identifiers form a novel namespace that allows cross-layer trust establishment. The de facto security negotiation protocols, namely Internet Key Exchange protocol and Transport layer Security handshake sub-protocol, provide end-to-end secure tunnel establishment, but fail to fit scenarios when a domain controller has to define the security parameters for a device under its supervision. We define in the second part of this dissertation how extensions could be applied to fullfill the previous requirement and delegate tunnel negotiation to a third party. Security validation results and the details of a preliminary implementation are also provided. Last, we design a framework for establishing trust basing on the entity behavior within a group of Personal Networks that share a part of their devices and services. Focusing on service discovery, we show that reputation-based trust can be applied to mitigate selfishness and fake announcements in a federation of Personal Networks
Ould, yahia Youcef. "Proposition d’un modèle de sécurité pour la protection de données personnelles dans les systèmes basés sur l’internet des objets". Thesis, Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1242/document.
Texto completoInternet of Things (IoT) and IT service outsourcing technologies have led to the emergence of new threats to users' privacy. However, the implementation of traditional security measures on IoT equipment is a first challenge due to capacity limitations. On the other hand, the offloading of data processing and storage poses the problem of trust in service providers.In this context, we have proposed an encryption solution that provides owner-centric data protection adapted to the constraining environment of IoT. This model is based on attribute-based encryption with secure offloading capability and Blockchain technology. Then, in response to the issue of trust and service selection, we explored the possibilities offered by artificial intelligence tools. To do this, we proposed a collaborative filtering model based on Kohonen maps and efficient solution to detect the untrusted users
Evans, William. "Trust in Japanese management and culture". Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00873698.
Texto completoDementhon, Agathe. "De la confiance aux représentations sociales : un nouvel éclairage théorique du concept de confiance : le cas de la confiance dans l'achat industriel". Paris 10, 2001. http://www.theses.fr/2001PA100013.
Texto completoWazan, Ahmad Samer. "Gestion de la confiance dans les infrastructures à clés publiques". Toulouse 3, 2011. http://thesesups.ups-tlse.fr/1450/.
Texto completoToday, the Internet has become a universal community, where the openness to diverse application areas, has been accompanied by a natural change in the profile of users. However, in this environment, the maturity of the services and applications is suffering from a problem of trust. The establishment of trust in the Internet requires the intervention of several elements. We refer to these elements by the term: trust chain. In all chains of trust, public key infrastructure (PKI) is a central element. It serves to establish a link between a public key and a physical entity whose certificate signed by a central entity called a certification authority (CA). Thus, PKIs provide means for the management and the distribution of keys and certificates. All elements of the trust chain create a trust management problem. We have dedicated our work, however, to PKIs, and more precisely in trust management of CAs. We have performed the following steps: • We have proposed a formal definition of trust in CAs. • We have defined an architecture that operates a validation service deployed by an entity independent of CAs, and recognized by a community of interest. • We have defined a calculation model that enables us to obtain a score between 0 and 1 representing the quality of a certificate (QoCER). Finally, we have implemented a prototype that demonstrates our ideas. In particular, we have presented how end users can interact with the validation service to make informed decisions about certificates
Hasrouny, Hamssa. "Gestion de confiance et solutions de sécurité pour les réseaux véhiculaires". Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0001/document.
Texto completoVANETs (Vehicular Ad-hoc Networks) consist of vehicles capable of exchanging information by radio to improve road safety (alerts in case of accidents or in case of abnormal slowdowns, collaborative driving…) or allow internet access for passengers (collaborative networks, infotainment, etc.). Road safety messages exchanged between vehicles may be falsified or eliminated by malicious entities in order to cause accidents and endanger people life. In this thesis, we focus on defining, designing and evaluating a security solution for V2V communications in VANET, to ensure a secure communication and a good level of confidence between the different participating vehicles. Adopting a group-based model, we consider the Trustworthiness evaluation of vehicles participating in VANET and we develop a Trust Model to analyze the behavior of the vehicles in the group while preserving the privacy of the participants and maintaining low network overhead. We then propose a hierarchical and modular framework for Misbehavior Detection and Revocation Management
Hasrouny, Hamssa. "Gestion de confiance et solutions de sécurité pour les réseaux véhiculaires". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0001.
Texto completoVANETs (Vehicular Ad-hoc Networks) consist of vehicles capable of exchanging information by radio to improve road safety (alerts in case of accidents or in case of abnormal slowdowns, collaborative driving…) or allow internet access for passengers (collaborative networks, infotainment, etc.). Road safety messages exchanged between vehicles may be falsified or eliminated by malicious entities in order to cause accidents and endanger people life. In this thesis, we focus on defining, designing and evaluating a security solution for V2V communications in VANET, to ensure a secure communication and a good level of confidence between the different participating vehicles. Adopting a group-based model, we consider the Trustworthiness evaluation of vehicles participating in VANET and we develop a Trust Model to analyze the behavior of the vehicles in the group while preserving the privacy of the participants and maintaining low network overhead. We then propose a hierarchical and modular framework for Misbehavior Detection and Revocation Management
Mitrano-Méda, Stéphanie. "Le mentorat entrepreneurial : application de la méthode des cas pour la modélisation de l'efficacité d'une relation tripartite". Thesis, Aix-Marseille, 2012. http://www.theses.fr/2012AIXM1043.
Texto completoEntrepreneurial mentoring is a developmental relationship between an experienced entrepreneur and a novice entrepreneur. Research is still at its infancy on this subject and it is difficult to find a holistic and unified view of the mentoring process. We are missing this integrated and robust vision and it is our aim in this research to propose one. In a formal entrepreneurial mentoring programme, the relationship is tripartite between the entrepreneur-mentor, the entrepreneur-mentee and the third party organisation initiating the programme. To construct a synthetic model of the mentoring process, we use the case study method for a comparative analysis of seven French entrepreneurial mentoring programmes. We analyse the eight functions of the third party and their impact on the quality of the relationship as well as the participants' learning process. Confronting all these results has enabled us to construct an efficiency model for the tripartite relationship of entrepreneurial mentoring
Coste, Benjamin. "Détection contextuelle de cyberattaques par gestion de confiance à bord d'un navire". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0106/document.
Texto completoNavigation and ship’s management are two essential aspects for the security of the ship itself and people on board as much as the maritime environment protection. Modern ships ensure these functions by increasingly embedding connected and automated technologies such as sensors, actuators, programmable logic controllers and pieces of software. However, the security of this objects as well as the trust in the information they produce cannot be guaranteed: they can be deceived or under the control of a malicious third party. In this context, a novel approach of data falsification detection is proposed. It is based on trust assessment of information system components which can be seen as inter-related functional blocks producing, processing and receiving pieces of information. The trust one can have inproduction blocks, called information sources, is assessed through its ability to report real situation of the ship. Trust is then propagated to the remainder part of the system. A simulator was made thanks to which we experiment several scenarios including intentional modification of numerical data. In these cases and under some conditions, the variability of trust give us the ability to identify the attack occurrence as much as its target. Our proposition is not restricted to naval information systems and can be employed in various situations even with human factor
Venart, Alain Joseph. "Des modes de contrôle par la confiance : le cas des établissements publics locaux d'enseignement". Nice, 2012. http://www.theses.fr/2012NICE0007.
Texto completoDefine the room for manoeuvre of the leader of a local secondary school from the perspective of different management mechanisms between the procedures and skills, to show the limits of the mechanisms, to describe the fundamental aspects of the mechanisms from a qualitative viewpoint: these are the key issues addressed in this research. Present the structures and aims of an organization at a time of significant social and institutional change; show the key issues in terms of piloting a school in particular analyzing the new problems raised by the institutional control of the former: these are the key points of our analysis. Describe the current institutional framework, based on performance measures and comparisons between national objectives and the actual results of the schools which leads us to question the fundamentals of the management of local secondary schools Detail the key aspects of the new forms of management based on a wish for greater control in order to investigate the implementation of management through trust in local Secondary school. Call into question local secondary schools as an organization for management and the tension between skills and performance as a method for evaluating the manager, not forgetting the ethical aspects of the latter
Mercier-Wiart, Françoise. "Le management de l'école à l'épreuve de réalités éducatives et sociales. Entre confiance et défiance : étude de cas". Lille 3, 2010. http://www.theses.fr/2010LIL30067.
Texto completoOuld, yahia Youcef. "Proposition d’un modèle de sécurité pour la protection de données personnelles dans les systèmes basés sur l’internet des objets". Electronic Thesis or Diss., Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1242.
Texto completoInternet of Things (IoT) and IT service outsourcing technologies have led to the emergence of new threats to users' privacy. However, the implementation of traditional security measures on IoT equipment is a first challenge due to capacity limitations. On the other hand, the offloading of data processing and storage poses the problem of trust in service providers.In this context, we have proposed an encryption solution that provides owner-centric data protection adapted to the constraining environment of IoT. This model is based on attribute-based encryption with secure offloading capability and Blockchain technology. Then, in response to the issue of trust and service selection, we explored the possibilities offered by artificial intelligence tools. To do this, we proposed a collaborative filtering model based on Kohonen maps and efficient solution to detect the untrusted users
Bensimhon, Larry. "Excès de confiance et mimétisme informationnel sur les marchés d'actions". Paris 1, 2006. http://www.theses.fr/2006PA010081.
Texto completoRibière, Vincent Michel. "Le rôle primordial de la confiance dans les démarches de gestion du savoir". Aix-Marseille 3, 2005. http://www.theses.fr/2005AIX32005.
Texto completoIn the new economy every company looking to remain competitive must manage its intellectual capital. Knowledge Management (KM) initiatives are expanding across all types of organizations worldwide. However, not all of them are necessarily successful mainly due to an unfriendly organizational culture. Organizational trust is often mentioned as a critical factor facilitating knowledge sharing. For this research we took an empirical approach to validate this assumption. The purpose of this research is to explore the relationships between organizational trust, a knowledge management strategy (codification vs. Personalization)and its level of success. This study was conducted among 101 US companies involved in knowledge management. A survey tool was developed and validated to assess the level of trust, the level of success and the dominant KM strategy deployed by an organization. Thirteen research hypotheses and a conceptual model were tested. The findings show the impact of trust on the choice of the KM strategy as well as on the level of success. The contribution of this study may help companies and their units seeking to launch a KM initiative to choose which KM initiative to employ in order to maximize their chance of success
Couteret, Paul. "La confiance dans la relation dirigeant-adjoint en petite entreprise". Montpellier 2, 1998. http://www.theses.fr/1998MON20023.
Texto completoLegrand, Véronique. "Confiance et risque pour engager un échange en milieu hostile". Thesis, Lyon, INSA, 2013. http://www.theses.fr/2013ISAL0041.
Texto completoNowadays, the electronic form of exchanges offers a new media able to make easy all information access, ubiquitous access, everywhere and everytime. But, at the same time, such a media - new, opened and complex - introduces unknown threats and breaches. So, how can we start up trust exchanges? From the system theory point of view, the cybernetic regulation maintains the sys-tems equilibrium with negative feedback loops. In this way, the defense line is based on a set of defense components still named Demilitarized Zone (DMZ) in order to block flow, to control anomalies and give out alerts messages if deviances are detected. Nev-ertheless, most of these messages concern only anomalies of machines and very little of human. So, messages do not take into account neither psychological behavior nor the dynamic of the context. Furthermore, messages suffer of the "big data" problem and become confused due to too much velocity, volume and variety. Finally, we can limit this problem to the understanding difficulty during the access to the specific knowledge in connection with the message. For example, the identity theft with the XSS attack is an illustration of this unfriendly environment. On the contrary, the living sciences show that organisms follow a positive regulation by where each one itself adapts according to his complexity. For that, they deploy adapted and continuous environment monitoring process still named "homeostasis". During this cycle, inputs capture information, then outputs adjust in response corre-sponding actions : this is the feedback. The strength of such a mechanism lies on the information meaning and in particular on the clues they include. In fact, some of these information include clues by which organisms can explain situations. For example, the information « attention" alludes to dangerous situation. This faculty comes from ad-vanced knowledge having first explicit relationship with this information: this relation forms what we call the "cognitive loop". To illustrate this phenomenon, the cognitive sciences often evoke "a friend immediately recognized by her friend" despite he is swal-lowed up in the crowd. But, the cognitive loop should not be broken. Like the living beings functioning, our work propose a cognitive model named Diag-nostic And Incident Model (DIM). The main idea lies on the context-aware model in order to adapt itself like "homeostasis". DIM has been founded on the principle of the "cognitive loop" where the inputs are the "logs" of numerics systems. So, in order to make easier the comparison between contextual and known situation, we will design "logs" and advanced knowledge by a common model. DIM proposes a conceptual struc-ture to extract clues from massive and various "logs” issued from environment based on advanced knowledge acquisition. Then, we propose the cognitive structure will be applied to the anomaly detection, incident management and diagnosis process
Castello, Michèle. "L'abus de gestion et le Droit pénal". Nice, 1998. http://www.theses.fr/1998NICE0015.
Texto completoWassmer, Martin Paul. "Untreue bei Risikogeschäften /". Heidelberg : C. F. Müller, 1997. http://catalogue.bnf.fr/ark:/12148/cb38872478t.
Texto completoBenson, Marie Anne. "Pouvoir prédictif des données d'enquête sur la confiance". Master's thesis, Université Laval, 2021. http://hdl.handle.net/20.500.11794/69497.
Texto completoConfidence survey data are time series containting the responses to questions aiming to measure confidence and expectations of economic agents about future economic activity. The richness of these data and their availability in real time attracts the interest of many forecasters who see it as a way to improve their traditional forecasts. In this thesis, I assess the predictive power of survey data for the future evolution of Canadian GDP, while comparing the forecasting performance of the Conference Board of Canada own confidence indices to the indicators I construct using principal component analysis. Using three simple linear models, I carry out an out-of-sample forecasting experiment with rolling windows on the period 1980 to 2019. The results show that principal component analysis provides better-performing indicators than the indices produced by the Conference Board. However, the results of the study cannot show that clear that confidence improves forecasting unambiguently once the lagged growth rate of GDP is added to the analysis.
Galanos, Jean. "Système d'information comptable et modèles de gestion émergents". Nice, 1991. http://www.theses.fr/1991NICE0003.
Texto completoThis work aims at contributing to adapt accounting information to the evolution of management models as well as to the differentiated needs of the users of such information. The inadequacy between management and accountancy was been formalized in a schedule of conditions, thanks to the preliminary setting up of methodological and theoretical tools in a systemic framework enlarged with philosophical, linguistic and antropological contributions. Thus a conceptual framework common to management and accountancy has been devised from the single concept of gap which incorporates and becomes more complex into the notions of movement and flow. A double-level accounting model is given from the schedule of conditions in the established conceptual framework. It enables at the first level to take into account changes relevant for the firm without break in the sequence and whatever the necessary units of measure are. The second level consists in specific accounting models and is only alluded to in this thesis, being the main opening of this work
Kurpiel, Adam. "Valorisation et gestion d'options : modèles à volatilité stochastique". Bordeaux 4, 2000. http://www.theses.fr/2000BOR40048.
Texto completoFall, Ibrahima. "Gestion optimisée de produits-modèles de procédés logiciels". Paris 6, 2012. http://www.theses.fr/2012PA066018.
Texto completoCurrently, software process artefacts are under-considered by the software process modelling and execution community. They are minimally managed. Moreover, the application of the principles of the model driven engineering on software processes have deeply changed the nature and increased the complexity of software artefacts : they become models (model-products hereafter). Taking into account such a complexity is a necessity with a view to optimize model-products management policies. This thesis has focused on the issue of the specification of the relationships between model-products by analysing the importance of the use of those relationships in model-products evolution management during process execution. We therefore have illustrated that using the respective specifications of relationships during process execution optimizes the management of model-products evolution in term of their consistency, their synchronization, and a flexibility in their granularity. Our solution fits in two major points that respectively relate to process modelling and enactment. According to process modelling, we have proposed a meta-model that captures the concepts to use to specify the model-products and the relationships between them. The meta-model takes also into account the details on these relationships as they are useful for an enhancement of used model-products management policies during the execution of the modelled processes. Our approach currently supports the nest and the overlap relationships. According to the process execution point of view, in order to structure the logical entities through which are managed the model-products of a process, we have proposed another meta-model. Such a meta-model therefore specifies process objects that represent model-products and their relationships during process execution. This meta-model also supports the nest and the overlap relationships, in compliance with the first one. The proposition also comprises transformation rules used to map concepts of the two meta-models and therefore to give the possibility of an automatic use of the modelling concepts through the enactment ones. The contributions of the approach are related to model-products management during process enactment. They essentially consist of a systematic synchronization and relational consistency between model-products, their aided creation, a flexibility in the granularity of their use, and their semantic integrity. We finally have prototyped a process modelling and enactment environment that implements our approach
Andréani, Jean-Claude. "Les modèles de prévision et de comportement en marketing pharmaceutique". Paris 1, 1986. http://www.theses.fr/1986PA010043.
Texto completoThis research concerns the description, the explanation and the forecast of physician's behavior prescription, from the representation of their decision's mecanisms and the treatment's process of the marketing informations. In order to make easy the systematic approach of these phenomenons, a theorical model is presented and discussed, then tested and validated. By hypothesis, the precription r(x) is described in the model as the result of two factors : a position function p(x) marking the doctor's attitude in front of products, and a motion's function resulting from the momentum produced by the information's cases. The position's function p(x) reproduced the decision and the prescription mecanims according to a knowledge conjunctive ruler (the evocated set), a preference's additive ruler (comparing the drug's idea to the criterions of the therapeutic class, and a intention's lexicographic ruler (given a ranking and a classification at the position of the product in the doctor's mind). The motion's function q(x) calculates the cognitive displacements involved by th the communication and by the utilisation's cases. The communication is under the step by step control of information and of the for functions : audience, attention, positioning, and product. It is controled also by selected functions of persuasiveness's medias : mouth to ears, resistance of change, inter or impersonal communication
Guerriero, Annie Halin Gilles. "La représentation de la confiance dans l'activité collective. Application à la coordination de l'activité de chantier de construction". S. l. : INPL, 2009. http://www.scd.inpl-nancy.fr/theses/2009_GUERRIERO_A.pdf.
Texto completoDuffet, Carole. "Quelle confiance accorder au modèle solution de la tomographie de réflexion 3D ?" Montpellier 2, 2004. http://www.theses.fr/2004MON20222.
Texto completoDidonet, Del Fabro Marcos. "Gestion de métadonnées utilisant tissage et transformation de modèles". Phd thesis, Université de Nantes, 2007. http://tel.archives-ouvertes.fr/tel-00481520.
Texto completoDidonet, del Fabro Marcos. "Gestion de métadonnées utilisant tissage et transformation de modèles". Nantes, 2007. http://www.theses.fr/2007NANT2039.
Texto completoThe interaction and interoperability between different data sources is a major concern in many organizations. The different formats of data, APIs, and architectures increases the incompatibilities, in a way that interoperability and interaction between components becomes a very difficult task. Model driven engineering (MDE) is a paradigm that enables diminishing interoperability problems by considering every entity as a model. MDE platforms are composed of different kinds of models. Some of the most important kinds of models are transformation models, which are used to define fixed operations between different models. In addition to fixed transformation operations, there are other kinds of interactions and relationships between models. A complete MDE solution must be capable of handling different kinds of relationships. Until now, most research has concentrated on studying transformation languages. This means additional efforts must be undertaken to study these relationships and their implications on a MDE platform. This thesis studies different forms of relationships between models elements. We show through extensive related work that the major limitation of current solutions is the lack of genericity, extensibility and adaptability. We present a generic MDE solution for relationship management called model weaving. Model weaving proposes to capture different kinds of relationships between model elements in a weaving model. A weaving model conforms to extensions of a core weaving metamodel that supports basic relationship management. After proposing the unification of the conceptual foundations related to model weaving, we show how weaving models and transformation models are used as a generic approach for data interoperability. The weaving models are used to produce model transformations. Moreover, we present an adaptive framework for creating weaving models in a semi-automatic way. We validate our approach by developing a generic and adaptive tool called ATLAS Model Weaver (AMW), and by implementing several use cases from different application scenarios
Touzeau, Suzanne. "Modèle de contrôle en gestion des pêches". Nice, 1997. http://www.theses.fr/1997NICE5051.
Texto completoDeschamps, Jean-Christophe. "Gestion hiérarchisée de cellules flexibles d'assemblage : concepts, modèles et simulation¨". Toulouse 3, 1994. http://www.theses.fr/1994TOU30269.
Texto completoBeaucourt, Christel. "Modèles d'ajustement en gestion des ressources humaines : pour ou contre une chaologie de la gestion". Lille 1, 1991. http://www.theses.fr/1991LIL12012.
Texto completoBecause of incertitudes and complexity, firms live in a middle of phenomenons and in a perpetually various situations. In order to become more flexible and to anticipate, firms are looking for a new way of management. In this purpose, we are suggesting some models of adjustment that show us several interests in humanizing the process of management. When a managment is fair and creative, a firm incrases its possibilities of managing contradictions. In fact, its actions appear as more pertinent because they integrate employees interests. Then, step by step the firm is getting more open to desorders. This reveal some other possible orders and also, participate to an auto-organization of the firm. We intervinced in tree firms to test our models and to draw the contour of a social adjustment. Then, we took the opportunity to think about some conceptual and operational bases which allowed a developpment of chaology in gestion
Morel, Martine. "Exploration des signaux faibles de la perte de confiance pendant une collaboration à distance". Compiègne, 2011. http://www.theses.fr/2011COMP1934.
Texto completoThe remote collaboration growth induces a need of new tools to compensate the perceptive instantiations of trust during a physical presence interaction. In this research about the weak signals of loss in trust, we have been interested in the perception of the loss in trust from the origin in their emotional biophysics birth until their expression in talk. Then, we have crossed the data of emotional expression of loss in trust that we had collect with an interview and with the collective production of the remote collaboration in a case of an offshore web development (European clients, Pantha Corp. Project manager in Australia) in outsourcing (Chinese a distributed software development team) using the AGILE/SCRUM method where the interactions stand everyday and only through computers. This research contributes to others referring to the link between a team emotional life and its performance. In addition Université de Technologie de Compiègne Martine MOREL Thèse en gestion 2011 Page 10 sur 442 to that, this research propose an adaptation of managerial practices of control by production scorecard, and also, of evaluation of quality, by rooting them in the analyze of interactions including their emotional component to infer on the mutual ability of stakeholders to maintain a trust relationship, this new concept is called "Quality 2. 0. " Moreover, in this Quality 2. 0 concept, the sensitive human being is placed in the center of the interaction at work. However, this research has been limited about the biophysics explorations of emotions in a situation in a remote interaction but it contributes to open more perspectives about the links
Lacroix, Julien. "Vers un cloud de confiance : modèles et algorithmes pour une provenance basée sur les contrôles d'accès". Thesis, Aix-Marseille, 2015. http://www.theses.fr/2015AIXM4365.
Texto completoThis document is the culmination of three years of thesis. Having introduced and cleared the general issue related to my thesis subject, i.e. « how to use provenance data to enforce trust in the Cloud? », I present a description of the concepts, models and languages related to my thesis and the state of the art that can partially address this issue. Secondly, I present the solution based on provenance that I bring to access controls, in distributed systems such as the Cloud: PBAC². It is based on a system combining both provenance models (PROV-DM) and access controls (generic rules of RBAC type with regimentation and regulation policies). This system uses a central execution engine denoted the mediator to enforce security and foster trust in the Cloud, via rule checking over a part of the retrospective provenance graph it received. Furthermore, I describe the study I made of three PBAC² extensions: (1) the integration of the PROV-O ontology and its pros and cons regarding the size of the (sub)graph received by the mediator; (2) the construction of the PBAC² adaptation with the regulation security approach; (3) the translation of PBAC² rules into PROV CONSTRAINTS constraints. Moreover, PBAC² is applied to a realistic example that belongs to the healthcare sector. A PBAC² prototype and a demonstration on some practical examples with a local machine and a real Cloud system illustrate the scope of this work. In conclusion of the thesis, I propose four perspectives of this work
Ramahan, Mohammad Ashiqur. "Processus agiles d'échange de document : modèles, interopérabilité et sécurité". Paris, Télécom ParisTech, 2010. http://www.theses.fr/2010ENST0042.
Texto completoToday's business organizations must deal with constant changes in their organizational structure and markets. This requires organizations to become agile through the adoption of increasingly flexible and information processing oriented business models. The concepts of workflows or business processes have become the main enablers of business environments. The trend to an increasing agility demands decoupling business process modeling from its execution, in comparison with classical workflows, which consist in a fixed sequence of concrete business tasks. The flexibility of such loosely coupled process models however entails new interoperability and security research challenges notably due to the need for supporting interactions beyond business boundaries and between a priori unknown actors. The main contribution of this thesis is the introduction of the notion of document-based agile workflow system. A basic methodology for modeling such workflows and their execution is first presented based on a declarative approach to processing the exchanged documents, which organizes and combines strategic business goals and rules into a unified framework. The use of an ontology based model for the semantic annotation of document data is then proposed as a solution for interoperability. That approach also provides the basic mechanism of a decentralized communication infrastructure supporting document distribution between actors during the execution of a document-based agile workflow. Security mechanisms are finally defined to enforce fine-grained document access control and document integrity, as well as dynamic key management among workflow participants
Abba, Hachimi. "L'esprit 4C dans l'entreprise : pour une coopération créative axée sur la communication et la confiance". Valenciennes, 2007. http://ged.univ-valenciennes.fr/nuxeo/site/esupversions/9d8be4fa-66e8-44aa-944e-2accc1af18c7.
Texto completoThis thesis examines project’s human dimensions, which has become a tool in business management. These dimensions were explored through two types of projects: the ISO 9001 quality certification and the implementation of a new Information System. Both projects share the same point: the difficulties, that is to say the lack of communication in the implementation of these tools of modern management. For most businesses this communicational aspect seems to easily go without saying. But, the observations we made on the field confirm the opposite. Therefore, this study consists in, on the one hand, studying projects’ communicational phenomena in business in order to understand why the human factor reacts against these tools; and on the other hand, implementing a model incorporating these human dimensions. This model called 4C has been proposed and implemented in the company. It is built around four fundamental concepts: communication, cooperation, confidence, creativity. The capitalization of the 4C model by the company and its extension to other projects in the group is a first perspective. Other research prospects will aim to improving the model along with organization and company as research laboratory
Straub, Stéphane. "Essays on incentives, institutions and development". Toulouse 1, 2002. http://www.theses.fr/2002TOU10076.
Texto completoIn the first chapter,we model the boundaries of the multinational firm by looking at a simple trade-off between FDI (internal expansion with strong control rights) and transfer of technology (arm's length expansion without control rights). We analyze the effects of contractual incompleteness due to problems of commitment in host countries, and introduce the possibility of corruption due to informational asymmetry. The model predicts that firms will prefer FDI the weaker the ability to commit of the host country, while more corruption will shift the trade-off toward arm's length expansion. Cross-country and panel empirical evidence supports these conclusions. In the second chapter, we build a regulation model in which renegotiation occurs due to the imperfect enforcement of concession contracts. We provide theoretical predictions for the impact, on the probability of renegotiation of a concession, of regulatory institutions, institutional features, economic shocks and of the characteristics of the concession contracts. We use a data set of nearly 1000 concessions awarded in Latin America from 1982 to 2000, covering the sectors of telecommunications, energy, transport and water, to test these predictions. Finally, we derive some policy implications of our theoretical and empirical work. Third chapter use a model of firms'choice between formality and informality. Complying with costly registration procedures allows the firms to benefit from key public goods, property rights and contracts enforcement, that enable the participation in the formal credit market. In a moral hazard framework with credit rationing, their decision is shaped by the interaction between the cost of entry into formality and the relative efficiency of formal or informal credit mechanisms. Testing the model with a firm-level data set, of 5985 firms in 48 countries, we find that both individual characteristics of the firms and country-level aspects matter in a way consistent with the theory
Loss, Frédéric. "Cinq essais sur la gestion des risques". Toulouse 1, 2001. http://www.theses.fr/2001TOU10096.
Texto completoThe first chapter provides a survey of theoretical and empirical literature on firms' hedging activities. The second chapter studies the effect of firms interactions on their hedging policies, when the capital market is imperfect. The third chapter analyses the firms' hedging demand where hedging is used to reduce agency costs between a principal and agent(s). The fourth chapter studies the effect of the possibility to create his own business on the current manager's behaviour. Finally, the last chapter looks at the risk management of a government due to his activity of control of agreements between firms
Haritchabalet, Carole. "Incertitude sur la qualité des biens : gestion des risques et apprentissage". Toulouse 1, 1998. http://www.theses.fr/1998TOU10007.
Texto completoThis dissertation studies the consequences of quality uncertainty on production and consumption. In the first chapter, we consider goods which quality is uncertain for firms only. When a frim must determine the quantity of goods to produce before knowing which goods will be defective, its revenue is uncertain. The production in excess of demand (by producing reserve goods) appears as an instrumentin the management of these risks, this strategy being a generalisation of self protection. It is shown that this strategy is a complement to an insurance strategy. The second and third chapters of this dissertation deal with goods which quality is uncertain for firms and consumers. In this setting, a learning problem on the quality of these goods arises. In these two chapters, we are interested in the study of a particular strategic behavior of consumers which is a waiting behavior to learn information from other agent's consumptions. The objective of the second chapter is to analyse how this strategic behavior affects the pricing policy of two competitive firms. We show that this waiting behavior favours firms in the sense that they are able to extract all the informational surplus without waiting for this information. The use of options appears to be an efficient instrument to induce a waiting behavior. The third chapter analyses the decision of a durable goods monopolist to introduce a new technology. In addition to prices, the monopolist uses production as mean to convey information about the quality of its product. The monopolist can ration the demand to induce information revelation, flood the market when learning about its product quality is sufficient or give up production when the quality of the product is too low
Wu, David. "Modèles d’optimisation pour la gestion de consommation d’énergie multi-flux". Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS221.
Texto completoThe large-scale automated collection of energy consumption data raises new optimization problems. The issue addressed in this thesis is to propose solutions for modeling and solving optimization models for multi-stream energy consumption management. The consumption data are represented as a time series.We first develop deterministic and robust models for the optimization of electricity contracting. This problem is formulated as the minimization of a convex objective function under special structure constraints (order constraints); it is solved by a new efficient algorithm that considerably reduces the computational effort, in the presence of a large amount of data, needed to evaluate the objective function. We then present deterministic and robust models around the optimal management of water networks using an automated strategy based on the use of trigger levels. We also show that the problem can be reduced to smaller daily problems without losing too much accuracy. Numerical results are presented and reveal the possibility of strong savings in the different energy systems studied
Gurviez, Patricia. "Le rôle central de la confiance dans la relation consommateur-marque". Aix-Marseille 3, 1998. http://www.theses.fr/1998AIX32057.
Texto completoOur objective is to introduce trust as a key variable in consumer-research, by offering a conceptual model of trust in the brand-consumer relationship. The first part consists of an epistemology of the concept of trust in the paradigms of marketing, social sciences and economics, and in the history of philosophy. The conquest of individual freedom, which is characteristic of modernity, leads to considering trust as a weak concept, seen as a calculation of subjective probabilities, or as a remnant of a pre-modern process. Part ii consists in (1) understanding the mechanisms of consumer trust, knowing that the brand value depends largely on its capacity to build this trust and (2) determining the antecedents and outcomes of trust. The analysis of literature helps to develop a conceptual model of the key role of trust in the brand-consumer relationship and to present the main hypotheses for the research. Consumer trust is therefore defined as his presumption that the brand, personified as a character, makes a commitment concerning the fulfillment of his expectations with predictability, and will maintain this orientation with benevolence for a long term. Consequently, trust is seen as a multi-dimensional construct, composed of credibility, integrity and benevolence. Part iii operationalizes and test empirically a structural model specifying the relationships between the different variables. Most of the hypotheses concerning relationships between antecedents, dimensions and outcomes of trust are confirmed. The three dimensions of trust seem to be correlated but clearly distinct constructs. The conclusion points out the limits and theoretical, methodological and managerial contributions made by the research ; suggestions for future research are presented
Hariton, Cyril. "Gestion et réglementation des infrastructures". Toulouse 1, 2002. http://www.theses.fr/2002TOU10072.
Texto completoThis thesis deals with concerns related to essential facilities ruled by either a profit maximizing firm or a social welfare maximizing regulator. Chapter 1 studies how a regulator should price access to an upstream regulated essential facility when downstream competition is imperfect. An ad valorem access charge is then prefered to a constant unit price. Chapter 2 focuses on the case where a regulator cannot constrain an upstream essential facility whereas it can regulate the downstream monopoly using the essential facility. Then, no regulation occurs if non linear tariffs are used upstream. Chapter 3 studies how to dynamically allocate access to an essential facility when facing customers requiring access for different number of periods and compare allocation strategies of a firm and a regulator. Chapter 4 departs from the standard optimal auctions of one good with private values by introducing a cost of monetary transfers and compares allocation of a firm and a regulator
Adnane, Hassiba Asmaa. "La confiance dans le routage Ad hoc : étude du protocole OLSR". Phd thesis, Université Rennes 1, 2008. http://tel.archives-ouvertes.fr/tel-00354194.
Texto completoDans notre travail, nous nous sommes intéressés à la gestion de la confiance (trust management) comme une solution de sécurité pour le protocole OLSR (Optimized Link State Routing Protocol). Cette approche s'adapte particulièrement à la nature mobile, ad-hoc, distribuée et auto-organisée des réseaux ad-hoc. De plus, la gestion explicite de la confiance permet aux entités de raisonner avec et à propos de la confiance, les rendant ainsi plus robustes pour la prise de décisions concernant les autres entités.
Nous commençons par une analyse du fonctionnement du protocole OLSR sous l'optique de la confiance. Ensuite, nous proposons un raisonnement basé sur la confiance pour permettre à chaque noeud d'évaluer le comportement des autres noeuds, de détecter les comportements malveillants, et donc de pouvoir décider de faire confiance ou non. Enfin, nous proposons une solution de prévention et des contremesures pour résoudre le cas d'une incohérence et contrer les comportements malveillants. Ces solutions ne nécessitent que peu de modifications sur le protocole OLSR et peuvent être étendues selon le type d'attaque et les besoins des utilisateurs.
Delaval, Matthieu. "Séquencement des lignes d'assemblage à modèles mélangés". Lille 1, 1997. http://www.theses.fr/1997LIL10161.
Texto completoDes stocks de gestion intermédiaires, appelés buffers, permettent d'assurer des re-ordonnancements du flux avant l'entrée dans l'atelier. Dans cette thèse, nous nous concentrons sur le problème du re-séquencement dynamique des véhicules en entrée de l'atelier de montage. Pratiquement, il s'agit de déterminer de façon périodique en vue de certaines contraintes quel sera le prochain véhicule présent dans le buffer de re-séquencement a lancer en montage. Parmi plusieurs approches de résolution envisageables pour traiter notre problème, deux méthodes émergent : la recherche par faisceau et le recuit simule. Les résultats obtenus sur des jeux d'essais de taille industrielle par chacune des deux méthodes sont compares et une analyse de l'influence de la taille de l'autostockeur est effectuée
Rhin, Christophe. "Modélisation et gestion de données géographiques multi-sources". Versailles-St Quentin en Yvelines, 1997. http://www.theses.fr/1997VERS0010.
Texto completo