Tesis sobre el tema "Respect de la vie"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "Respect de la vie".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Flaud, Ivan. "Le droit au respect de la vie familiale". Chambéry, 2004. http://www.theses.fr/2004CHAML024.
Texto completoGarret-Flaudy, Orlane. "Détention et droit au respect de la vie familiale". Lyon 3, 2000. http://www.theses.fr/2000LYO33035.
Texto completoAntignac, Thibaud. "Méthodes formelles pour le respect de la vie privée par construction". Thesis, Lyon, INSA, 2015. http://www.theses.fr/2015ISAL0016/document.
Texto completoPrivacy by Design (PbD) is increasingly praised as a key approach to improving privacy protection. New information and communication technologies give rise to new business models and services. These services often rely on the exploitation of personal data for the purpose of customization. While privacy is more and more at risk, the growing view is that technologies themselves should be used to propose more privacy-friendly solutions. Privacy Enhancing Technologies (PETs) have been extensively studied, and many techniques have been proposed such as anonymizers or encryption mechanisms. However, PbD goes beyond the use of PETs. Indeed, the privacy requirements of a system should be taken into account from the early stages of the design because they can have a large impact on the overall architecture of the solution. The PbD approach can be summed up as ``prevent rather than cure''. A number of principles related to the protection of personal data and privacy have been enshrined in law and soft regulations. They involve notions such as data minimization, control of personal data by the subject, transparency of the data processing, or accountability. However, it is not clear how to translate these principles into technical features, and no method exists so far to support the design and verification of privacy compliant systems. This thesis proposes a systematic process to specify, design, and verify system architectures. This process helps designers to explore the design space in a systematic way. It is complemented by a formal framework in which confidentiality and integrity requirements can be expressed. Finally, a computer-aided engineering tool enables non-expert designers to perform formal verifications of the architectures. A case study illustrates the whole approach showing how these contributions complement each other and can be used in practice
Athea, Valene. "La gouvernance d'entreprise face au respect de la vie privée des salariés". Thesis, Paris Est, 2015. http://www.theses.fr/2015PESC0063/document.
Texto completoThe notion of governance seems to cover themes close to the term "to govern", of the grip of decision and the evaluation.It represents all the organs and the rules of decision, information (transparency) and supervision allowing the legal successors and the partners of a company, to see their respected interests and their voices in the functioning of this one.The governance of company proposes a new conception of the process of decision, granting all its place to the dialogue between the stakeholders.The union representative intervenes in this sense, indeed, he has a mission of claiming (for example concerning the increase in salaries), he is the interlocutor of the labor union(syndicate) with the employer, he negotiates with the latter the standards of the company (agreements and collective labor agreements)Framed by laws assuring the essential transparency, the governance of company would be in theory the way to assure at best the multiple interests of the actors concerned (employees and employers).It is the reason why it seemed convenient to draw a parallel between the exercise of the governance of company by the concerned actors and the respect for private life of the employees.The governance of company can be limited by the respect for private life of the employees.It is about a fundamental law, proclaimed by the law, registered in the bill of rights of 1948 (article 12), the European Convention on Human Rights and fundamental liberties (article 8), on the article 9 of the Civil code and on the article 226-1 of the Penal code.The components of the private life were not the object of a definition or a restrictive enumeration to avoid limiting the protection to the only legal forecasts. The courts applied the principle of this protection, in the right to life sentimental and in the family life, in the secret concerning the health, concerning the secret of the residence and the place of residence, and concerning the right(law) for the image
Alamelou, Quentin. "Protocoles cryptographiques pour l’authentification numérique et le respect de la vie privée". Thesis, Limoges, 2017. http://www.theses.fr/2017LIMO0042/document.
Texto completoInternet constant growth has naturally led to cryptographic issues such as authentication and privacy concerns. The common usage of connected devices (smartphones, tablet, watch, …) as authentication means made us consider cryptographic keys generations and/or managements from such devices to address aforementioned needs. For such a purpose, we identified fuzzy extractors and group signature schemes. On the one hand, this thesis then presents the first reusable fuzzy extractor based on set difference metric (in the nonprogrammable random oracle). In so doing, we were able to design a key generation module performing authentication from users’ devices. On the other hand, we came up with two group signature schemes, respectively based on Hamming and rank metrics, that seriously compete with post-quantum concurrent schemes based on lattices
Fragoso, Rodriguez Uciel. "Modèle de respect de la vie privée dans une architecture d'identité fédérée". Phd thesis, Institut National des Télécommunications, 2009. http://tel.archives-ouvertes.fr/tel-00541850.
Texto completoLajoie-Mazenc, Paul. "Réputation et respect de la vie privée dans les réseaux dynamiques auto-organisés". Thesis, Rennes 1, 2015. http://www.theses.fr/2015REN1S039/document.
Texto completoReputation mechanisms are very powerful mechanisms to foster trust between unknown users, by rewarding good behaviors and punishing bad ones. Reputation mechanisms must guarantee that the computed reputation scores are precise and robust against attacks; to guarantee such properties, existing mechanisms require information that jeopardize users' privacy: for instance, clients' interactions might be tracked. Privacy-preserving reputation mechanisms have thus been proposed, protecting both clients' privacy and the providers' one. However, to guarantee strong privacy properties, these mechanisms provide imprecise reputation scores, particularly by preventing clients to testify about their negative interactions. In this thesis, we propose a new distributed privacy-preserving reputation mechanism allowing clients to issue positive as well as negative feedback. Such a construction is made possible thanks to tools from the distributed systems community -- distributed third parties that allow for a distribution of trust and that tolerate malicious behaviors -- as well as from the cryptographic one -- for instance zero-knowledge proofs of knowledge or anonymous proxy signatures. Furthermore, we prove that our mechanism guarantees the required privacy and security properties, and we show with theoretical and practical analysis that this mechanism is usable
Moreno, Barbosa Andrés Dario. "Passage à l’échelle des systèmes de recommandation avec respect de la vie privée". Thesis, Nice, 2014. http://www.theses.fr/2014NICE4128/document.
Texto completoThe main objective of this thesis is to propose a recommendation method that keeps in mind the privacy of users as well as the scalability of the system. To achieve this goal, an hybrid technique using content-based and collaborative filtering paradigms is used in order to attain an accurate model for recommendation, under the strain of mechanisms designed to keep user privacy, particularly designed to reduce the user exposure risk. The thesis contributions are threefold : First, a Collaborative Filtering model is defined by using client-side agent that interacts with public information about items kept on the recommender system side. Later, this model is extended into an hybrid approach for recommendation that includes a content-based strategy for content recommendation. Using a knowledge model based on keywords that describe the item domain, the hybrid approach increases the predictive performance of the models without much computational effort on the cold-start setting. Finally, some strategies to improve the recommender system's provided privacy are introduced: Random noise generation is used to limit the possible inferences an attacker can make when continually observing the interaction between the client-side agent and the server, and a blacklisted strategy is used to refrain the server from learning interactions that the user considers violate her privacy. The use of the hybrid model mitigates the negative impact these strategies cause on the predictive performance of the recommendations
Arnaud, Stéphanie. "Le respect de la vie personnelle des salariés dans la relation de travail". Aix-Marseille 3, 2006. http://www.theses.fr/2006AIX32028.
Texto completoPrivacy consists in a logic of self-determination and informational monopoly on personal data. Respecting it means conceding autonomy and reducing monitoring and information screening on employees. There are legal vaguenesses in which managers find the possibility to choose between different levels of respect of workers' personal life: To what extent can they promote employees privacy without compromising organizational efficiency ? According to standard agency theory, incentives reduce opportunism and foster extrinsic motivation. In psychology, theory of self-determination and cognitive evaluation explains that a work environment which doesn't respect the logic of a person self-determination, crowds out her self-regulated motivation. We find that every work situation requires a particular equilibrium between those two types of motivations which implies appropriate forms of management and monitoring – and therefore, the optimal level of privacy. Our hypotheses are globally validated by a structural equations model based on 568 questionnaires distributed to French workers. Results show the crowding-out / crowding-in effect of self-regulated motivation by a type of management perceived as controlling / informative and autonomy supportive. Situational management appears to be a solution to conciliate the respect of employees' privacy with the firm's performance
Lagoutte, Stéphanie. "Le droit au respect de la vie familiale dans la jurisprudence conventionnelle européenne". Paris 1, 2002. http://www.theses.fr/2002PA010278.
Texto completoKillijian, Marc-Olivier. "CONTRIBUTIONS À LA RÉSILIENCE ET AU RESPECT DE LA VIE PRIVÉE DES SYSTÈMES MOBIQUITAIRES". Habilitation à diriger des recherches, Université Paul Sabatier - Toulouse III, 2013. http://tel.archives-ouvertes.fr/tel-00849725.
Texto completoJuncu-Moraru, Corina. "Le droit au respect du secret de la personne, droit fondamental ?" Aix-Marseille 3, 2008. http://www.theses.fr/2008AIX32025.
Texto completoIs there a right to secrecy and, if so, should this right be classified as a fundamental right? Indeed, should one not notice, beyond the protection of privacy, the gradually emerging elements of a fundamental right, inseparable from the very notion of natural person, an area representing the secrecy of a human person without which his/her unique individual consciousness, as well as his/her opinions and choices could not express themselves in action? In addition to the transparency requirements, designated in recent decades as the foundation of democratic societies, the urgent need to abide by a secrecy domain proper to the human person becomes more imposing each day, obligation most often accompanied by legal sanctions and gradually developing into a right. This necessary secrecy, a counterpart of the freedom of expression, ultimately acts as another guarantor of a pluralist democracy. The explosion of technical means of investigation requires rethinking the relationship already established between secrecy and information. The individual must be protected against indiscreet and unjustified intrusions in the substance of his person by a right to secrecy, essential to his/her self-determination. Only the right to secrecy provides him/her with the legal background enabling him/her to determine his/her own profound values and build his/her own identity. The place secrecy occupies in each individual’s life and in society as a whole, leads one to wonder about the meaning of this concept, the legal nature of the right to secrecy, and the modalities of his/her protection under the positive law. The first part of this thesis seeks therefore to bring to light the protection of the secrecy by constitutional and European judges, as well as its characteristics as a fundamental right. The second part of this study is devoted to the analysis and synthesis of all normative acts that ensure the preservation of various aspects of the right to secrecy. These texts, often criminally sanctioned, are common in French law, though, with no one actually attempting to fully comprehend them so far. Their scope confirms that, while a fundamental right, the right to secrecy can never be absolute
Barki, Amira. "Mécanismes cryptographiques conciliant authentification et respect de la vie privée dans le contexte du M2M". Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2337.
Texto completoMachine to Machine (M2M) applications enable a better management of resources and provide users With greater cornfort. Unfortunately, they also entail serious security and privacy concerns. ln this thesis, we focus on M2M security, and particularly on the authentication and privacy issues of M2M applications involving a SIM card. ln the first part, we design five new cryptographic primitives and formally prove that they meet the expected security requirements. More precisely, they consist of a partially blind signature scheme, a sequential aggregate Message Authentication Codes (MAC) scheme, an algebraic MAC scheme and two pre-Direct Anonymous Attestation (pre-DAA) schemes. Some of the proposed schemes aim to achieve a particular property that was not provided by previous constructions whereas others intend to improve the efficiency of state-of-the-art schemes. Our five schemes do not require the userls device to compute pairings. Thus, they are suitable for resource constrained environments such as SIM cards. ln a second part, we rely on these primitives to propose new privacy-preserving protocols. More specifically, we design an efficient private eCash system. We also propose a protocol enabling anonymous authentication and identification of embedded SIMs (eSlMs). Furthermore, we rely on our algebraic MAC scheme to build a practical Keyed-Verification Anonymous Credentials (KVAC) system. Finally, based on our sequential aggregate MAC scheme, we introduce a remote electronic voting system that is coercion-resistant and practical for real polls. The security of our protocols is formally proven in the Random Oracle Model (ROM) under classical computational assumptions
Smentek, Colette. "Korczak, une vision spécifique de l’enfance : le rôle et la place de l’enfant dans la vie et l’œuvre de Korczak". Thesis, Lyon, 2016. http://www.theses.fr/2016LYSE2054.
Texto completoThis thesis offers observation and analysis on the topic of education in Korczak’s work. Childhood is the recurring theme in the works of this renowned doctor, poet and writer. This analysis takes into account the theme of childhood throughout the diversity of the works of this doctor educator. Janusz Korczak is mainly known as the man who refused to abandon his Jewish orphans when they were taken to the death camps of Treblinka. Why this ultimate act ? A look into his life has been necessary in order to study the educator in his whole and to extract the essence of his thought. Understanding the man throughout key moments of his life and some of his irrevocable choices which lead him to think about the children’s condition. His works include children’s books, biographical books but also some more educational. Studying them leads us to understand fully the ideas Korzack had about childhood and the values he defended such as the right for respect. Finally, the aim is to analyse Korzack’s ideas in relation to the new education and to identify its characteristics. Throughout this thesis, the objective is to understand how the theme of childhood in its pedagogic, philosophic and biographic aspects has influenced the theoric and educational choices and commitment of Korczak
Augand, André-Jacques. "Respect de la vie privée en matière de nouvelles technologies à travers des études de cas". Thesis, Paris 2, 2015. http://www.theses.fr/2015PA020027.
Texto completoThe development of the Internet and online services have resulted in a proliferation of information collected from users - explicitly or without their knowledge. Furthermore, such information may be disclosed to third parties, or crossed with other data to create user profiles, or contribute to the identification of an individual.-The intensity of human activities in social networks is therefore a breeding ground for potential violations of user privacy. This research aims to study first the socio-economic determinants of the use and adoption of the Internet in a developing society. Then we studied the perception, risk control, and trust perceived by the user of the Internet in the context of online networks (Facebook, LinkedIn, Twitter, Myspace, Viadeo, Hi5 etc.). We developed a questionnaire that was administered to Gabon surfers. Our results showed that socio-economic status and people's living conditions strongly influence the use of the Internet in Libreville and Port-Gentil. Regarding the perceived trust and user behavior, three types of determinants of trust were identified: the website-related factors (social networks), factors related to various public and private organizations of Gabon (Army, police, judiciary, administrations and companies) and factors related to the user (risk aversion). These results are sufficient to relativize the effectiveness of Gabonese policies to ensure broad coverage of countries by ICT supposed to create added value and improve the living standards and social welfare of citizens. From these results, managerial recommendations for managers of social networks and regulatory bodies including the Gabonese National Commission for the Protection of Personal Data (CNPDCP) are proposed. We will propose practices to better protect the privacy of users of online social networks
Benet, Alain. "Analyse critique du "Droit" au respect de la vie privée contribution à l'étude des libertés civiles". Lille 3 : ANRT, 1986. http://catalogue.bnf.fr/ark:/12148/cb37594489q.
Texto completoTalmud, Jérôme. "Respect de l'être humain et de la vie dans la médecine hébraïque des origines à nos jours". Reims, 1997. http://www.theses.fr/1997REIML005.
Texto completoOur study on hebraic medicine is about one of the foundation of this one : respect for the human being during all his life, from his conception to his old age and his death. In that sphere, thora is a guide for the one who accomplishes the mitsvot and respects talmudic principles in all the domains of life : bodily hygiene, hygiene of the house, of life (casher food), consultation, at regular intevals of an adam doctor and non idolatrous, whose responsabilities bring him to cure the patient, to treat him and not to infringe respect for the corpse, obligation to respond to this respect for all the jews. By the way, hala'ha disputes the criteria of death, just as autopsy and euthanasia ones, and institues three principles : issour hanna, nivoul 'hamet and 'hiyouv kevoura. The mitsva "grow an multiply |" encounters a multiple problematic: contraception, abortion, medically assisted procreation question hala'ha ; moreover, these ones notably ask the eugenism question. With h. I. V. -aids, we have seen how prevention was differently defined. Nevertheless, although homosexuality is inacceptable for hala'ha, all the patients, whatever was their past, are greeted, treated and rallied round like brothers, until the end of their life. The organ transplants study shows that each one of these needs a personal approach ; they are authorised in pikoua'h nefech cares, unic legal possibility to contravene chabbat and thora. The medico legal aspect allows to delimit different concepts : the real value of the talion law, refuge - towns, irresponsability of the mad, the child and the deaf - mute. The responsability right requirement consists of a double aspect : the man must protect his physical integrity, and also, not injure the others'. In case of injury to others, five indemnities are foreseen : physical incapacity, pain, incapacity to work, compension for medical care and moral domage
Jammet, Adrien. "La prise en compte de la vie privée dans l’innovation technologique". Thesis, Lille 2, 2018. http://www.theses.fr/2018LIL2D003/document.
Texto completoThe study of privacy within technological innovations is the study of the legal system surrounding personal data. However, the complexity and context of the subject imposes a pragmatic analysis, gathering elements of economy and technology, to define the reality of the use of the law by and within numerical innovations. As such, it necessitates a phenomenological approach, reviewing the historical steps that lead to the particular set of protections that the legislator has chosen, from a general protection of privacy towards a special regime applicable to personal data, and then an observation of its effectiveness to protect the essence of privacy. At the center of this work, we can find the will to understandthe gap between the trust given by the public to technology regarding the respect of one’s privacy and the declarations of legislators on the efficiency of the legislative response. Since the consent is the core principle of these regulations, this divergence deserves a legal analysis. Consequently, we can sum this thesis by a simple question: what it the real efficiency of privacy’s protection regime facing technological innovations ?
Payraudeau, Christel. "La protection du droit au respect de la vie privée par le Conseil constitutionnel à l’épreuve du numérique". Thesis, Corte, 2022. http://www.theses.fr/2022CORT0006.
Texto completoThe constitutionalisation of the right to privacy has progressively found its place, but with the advent of digital technology, new issues have emerged. Our society has undergone major changes over the last few decades, and even though modern technologies are very attractive due to their undeniable efficiency, they are evolving very fast and the law can thus only intervene too late.In this context and with regard to the supremacy of digital technology, we must question the reality of individual freedoms and fundamental rights. Privacy is shaken up by new practices. These issues are inescapable whatever the global challenges be they security, economic or political ones. It is necessary to analyse how the constitutional Council positions itself in order to better identify its limits. In our digital age, how can the much needed protection of the constitutional Council appear as inadequate as regards the right to privacy ?The purpose of this thesis is to demonstrate that in an ever-evolving technological world, the three themes studied here are inextricably linked: the right to privacy, as with individual freedoms which prevail, digital technology which makes itself indispensable and the constitutional court to guarantee the proper functioning and the management of these notions which could easily become antagonistic. We will identify the constitutional objectives which can be opposed to the right to privacy as well as the guarantees which determine the conciliation of this right with legislative objectives. In our study, we will consider that privacy in the digital virtual world has two sides that the constitutional Council is attempting to guarantee: on the one hand, protecting our relationship with others and on the other hand protecting the individual.It is important to remain critical of the use made of our personal data. With digital technology, the protection of privacy must unquestionably be analysed beyond our national borders. To analyse the dangers which threatens it, it is interesting to look at the study of the constitutional Council decisions in order to be able to compare case law and French legislation to those of other countries. Digital tools, due to their possible impacts on many aspects of our lives, considerably reduce spatial and temporal boundaries, which increasingly appear as obsolete. The digital network can virtually connect people all over the world. Therefore, constitutional protection is today part of a very different context insofar as exercising our freedoms and rights, such as privacy, inevitably has a supranational dimension
Youhnovski, Sagon Anne-Laure. "Le droit de la vie humaine. Contribution à l'étude des relations entre la vie humaine et le droit". Electronic Thesis or Diss., Lyon, 2021. https://scd-resnum.univ-lyon3.fr/in/theses/2021_in_youhnovski_a_l.pdf.
Texto completoThe big bang caused by the meeting of human life and law has led to the creation of several legal prescriptions that have human life as their object. Despite their heterogeneous nature, it is possible to outline a common structure, enabling stability and unity in the relationship between human life and law. The law of human life is the structuring concept of this relationship. Mustered as a new key to reading their relationship, the law of human life should make it possible to identify all the dynamics that make them oscillate.Precisely, the law of human life is subject to opposing currents. A first trend uses the law as an instrument to increase the respect for life. A second liberal current tends to solicit the exercise of control over life, reflecting the movement towards the subjectivisation of fundamental rights and freedoms, to which the valorisation of personal autonomy provides fertile ground. The law of human life thus has a dual nature, the right to respect for life forging its objective nature, the right over life revealing its subjective nature. These two rights are seemingly antagonistic. However, taking into account the degree of subjectivisation of the law of human life allows us to qualify the influence of this phenomenon on it. The State, charged with the task of striking a balance between these two poles, sets itself up as the guardian of respect for life, with the deployment of the regime of control over life being controlled or even curbed. The balance of power within the law of human life turns out to be disproportionate to the right to respect for life. The duplication of the law of human life allows the right to respect for life and the right over life to coexist without causing their mutual neutralisation
Farget, Doris. "Le droit au respect des modes de vie minoritaires et autochtones dans les contentieux internationaux des droits de l'homme". Thèse, Aix-Marseille 3, 2010. http://hdl.handle.net/1866/4518.
Texto completoThis research aims to explain and evaluate the emergence of a right of minorities and indigenous peoples to the respect of their ways of life, appearing before the European court of human rights, the Inter-American court of human rights and the United Nations Human rights Committee. The decisions and communications stemming from these tribunals will be analyzed and compared. This topic raises several questions regarding the legality of this norm, its meaning, effectiveness and limits, but also its implementation. In order to offer an interpretation of the content of that right, we need to evaluate the references made to it by the claimants, the judges and experts, which implicates an interdisciplinary approach focused on anthropological studies of law. This leads us to examine the discourses of judges, experts and claimants, to compare them and to observe their confluences and discrepancies. The results of this study show us that the emergence of this new norm is dependent upon the intervention of several agents – the claimants, the judges, the experts of the Committee and the States. This observation therefore confirms the polycentric process of construction of international legal rules. As to the legality and the effectiveness of the right of minorities and indigenous peoples to their ways of life, they vary according to the legal system, even if this right always corresponds to a legal rule. This rule consecrates a specific right belonging to indigenous and tribal people or to the members of indigenous people and minorities. It protects a relationship to the territory, i.e. a way to comprehend and to exploit it, to circulate on it and to inhabitate it. It also protects some activities. The indigenous, tribal and romas applicants unofficially take part in the legal definition of their ways of life, as the requests they submit to the international tribunals are cornerstones of judicial interpretations. In spite of a process of co-determination of the norm, gaps are observed between the positions of the different actors participating to the determination of the norm. They are either related to the impossibility for some judges to apply the right to a way of life to the case, to the distance between the positions of the claimants and the states, or to the protection of third parties. Consequently, a process of double distortion of the content of the norm appears, due to the judges’ or experts’ conceptions, but also to those of the claimants. It leads to the emergence of several problems, such as essentialism and the idealization of minorities and indigenous ways of life, paternalism, victimization or discrimination towards the claimants or their communities. These problems can alter the meaning and the impact of the norm. Nonetheless, the right to the respect of those ways of life has some theoretical effects related first to the coexistence, on a same piece of land, of different groups possessing diverse identities. They are also related to the improvement of the applicants’ quality of life and to the recognition process. However, the State’s willingness still occupies a large space in international law, as does the importance, for judges, to protect their own legitimacy. Moreover, some decisions seem too ideal or dogmatic. Those factors limit the effect of the norm. Thus, the articulation of judicial discourses and the efficiency of the norm are first contingent to the enunciation and to the clarity of the claimants’ requests. They are dependant of the receptivity of the agents whose role it is to receive them (judges and experts) and to the political, social and cultural context within which they take place. This last factor brings to light the importance for each agent participating to the elaboration of the norm to use, as much as he can, the margins he possesses.
Thèse de doctorat réalisée en cotutelle avec la Faculté de droit de l'Université Aix-Marseille 3.
Wilson, Kevin Alexander. "Love and Respect: The Bandung Philharmonic". Kent State University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=kent1609459910379284.
Texto completoToulieux, Fabrice. "Le droit au respect de la vie familiale des étrangers et l'article 8 de la convention européenne des droits de l'homme". Lyon 3, 2008. https://scd-resnum.univ-lyon3.fr/out/theses/2008_out_toulieux_f.pdf.
Texto completoIn its initial version, the Convention for the protection of Human rights and fundamental freedoms doesn’t guarantee foreigners either a right of entry and residence on the territory of a Member State or a protection against an expulsion measure. However, since decisions concerning aliens police may infringe the right to respect for family life that the article 8 of the Convention protects, both european and french case-law admit that litigation on aliens police enters the scope of this article. To benefit from this protection, the foreigner must prove that the measure in question, taken by public authorities, constitutes an interference with his family life. Invasions of family life are accepted only if, in accordance with the law and seeking a rightful purpose aimed at in the second section of the article 8, they are necessary in a democratic society. Otherwise, public authorities have to make up for the disproportionate infringement, adopting the more suitable measure to realise or maintain the family unity on the french territory. Regardless of national law, which enables foreigners to enjoy a right of entry and residence in France or a protection against an epulsion measure, interested parties can obtain recognition of such rights on the basis of the article 8 of the European Convention. Foreigners can therefore equally put forward national law or Europena Huma, rights law
Smedberg, Sandra. "Educators’ and learners’ view on feedback : a study about feedback, respect and corporal punishment in a South African school". Thesis, Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-31578.
Texto completoMachara, Marquez Samer. "Models and algorithms for managing quality of context and respect for privacy in the Internet of Things". Thesis, Université Paris-Saclay (ComUE), 2015. http://www.theses.fr/2015SACLL005/document.
Texto completoThe Internet of Things (IoT) is a novel paradigm, which basic idea is the pervasive presence around us of a variety of things or objects that are able to interact with each other and cooperate with their neighbors by sharing data, directly acquired by measuring some facts, in order to reach common goals. This information not only represents the state of users but also the processes in which they are involved, this is called the Context. The context informs both recognition and mapping operations by providing a structured, unified view of the world in which a system operates. With the IoT, many applications consume context information concerning users (context owners) such as, daily routines, behaviors and health, offering lots of benefits to users, but compromising their privacy. The re-search problematic of this thesis lies within the “semantic-oriented” IoT vision. In this context, semantic technologies play a key role in exploiting appropriate modelling solutions for integrating privacy security into the IoT. Context-aware applications and services (context consumers) expect correct and reliable context data to adapt their functionalities. In this thesis the Quality of Context (QoC) is meta-data attached to context information describing a range of criteria that express context information quality. These meta-data can be used to determine the worth of the information for a particular application in a particular situation. We explore middleware and framework solutions to integrate the management of privacy and QoC in the IoT. This thesis is distinguished from other context management domain researches by bearing in mind the decoupling of the IoT participants, i.e., the owners of context information and the consumers of this context information. Moreover, we consider the QoC as a factor affecting the privacy of individuals. This thesis provides the following contributions along two axis: 1. Designing a Context Contract Meta-model to define privacy and QoC concerns of decoupled context owners and context consumers based on reciprocal trust. This design is based on two points. Firstly, we consider that privacy is the capacity of context owners to control what, how, when, where and with whom to share information. Therefore, we identify four privacy dimensions (purpose, visibility, retention, QoC), and use them in the definition of access policies and obligations. Secondly, context consumers expect a certain QoC level in order to perform their tasks. We then propose to define two kinds of context contract for the producer and the consumer sides as follows: Context producer contract: A context contract whose clauses are expressions of the production of context data, of privacy requirements, and of QoC guarantees; Context consumer contract: A context contract whose clauses are expressions of the consumption of context data, of QoC requirements, and of privacy guarantees. Each context contract is created without the knowledge of is counter party.2. Proposing an algorithm to create agreements among context producers and context consumers by evaluating and compare requirements against guarantees, stated on their respective context contracts. As both IoT participants have symmetric contracts, when one participant defines its requirements, the other one defines its guarantees. The matching process of these context contracts verifies if the requirements of one party are included within the guarantees offered by the other party. Therefore, taking a decision based on this compatibility match from the producer point of view is to permit or deny the access to context data. Complementarily, from a consumer point of view, the consumption of context data is permitted or denied. From this definition, we designed algorithms to determine whether access and consumption are authorized or not, according to the context contracts matching
Laliberté, Bianca. "Le Droit à la protection de la vie privée et au respect de la confidentialité des dossiers de thérapie des plaignantes dans le cadre des procès pour infractions d'ordre sexuel une utopie". Sherbrooke : Université de Sherbrooke, 1998.
Buscar texto completoAlbayrak, Sabrina. "Respect du droit aux choix et aux risques des personnes âgées en institution : impacts sur la perception de la qualité de vie des résidents". Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLV017.
Texto completoThe aim of this thesis was first to study how the liberty of the residents in nursing homes for elderly has been impacted by the policies led regarding the respect of the right to choose and to take risks. Secondly, we studied the impact they had on the way of living chosen by the elderly.The first part of the thesis aims at studying the state of the aging process and the status of the elderly in France and the influence of our own social representations, on their behavior. The hypothesis of a link between our Society’s prejudices on the elderly and the decrease in their autonomy is implicit.The second part of the thesis aims at better understanding the nursing homes residents’ expression possibilities. We also focused on the factors which would allow their emergence in standard places at all levels of social life.Our main hypothesis is that the dependency level of a person (physical and/or psychological) is no impediment to his or her capacity to bear in mind their liberty margin, which expression is determined by external and internal personal factors.The third part of the thesis tackles the policies put in place to respect the elderly rights to choose and take risks within their caring homes, as well as the ethical, medical and social stakes raised by this notion.The hypothesis of the link between the setting up of these policies and a certain organizational context has been emphasized.Finally, in the last part, we studied the impact the policies applied on the respect to choose and take risks had on the residents’ perception of their quality of life.An indicator grid has been co-produced to distinguish the institutions respect of their residents’ rights and risks.The results we obtained highlights the significance of taking into account the respect and the dignity of the elderly in the study of the protective factors of the quality of life, both at the individual and contextual level
Jambert, Amandine. "Outils cryptographiques pour la protection des contenus et de la vie privée des utilisateurs". Thesis, Bordeaux 1, 2011. http://www.theses.fr/2011BOR14234/document.
Texto completoPrivacy is, nowadays, inseparable from modern technology. This is the context in which the present thesis proposes new cryptographic tools to meet current challenges.Firstly, I will consider zero-knowledge proofs of knowledge, which allow in particular to reach the anonymity property. More precisely, I will propose a new range proof system and next give the first comparison between all existing solutions to this problem. Then, I will describe a new method to verify a set of ``Groth-Sahaï'' proofs, which significantly decreases the verification time for such proofs.In a second part, I will consider sanitizable signatures which allow, under some conditions, to manipulate (we say ``sanitize'') a signed message while keeping a valid signature of the initial signer. I will first propose a new scheme in the classical case. Next, I will introduce several extensions which enable the signer to obtain better control of the modifications done by the ``sanitizer''. In particular, I will propose a new security model taking into account these extensions and give different schemes achieving those new properties.Finally, I will present different applications of the above cryptographic tools that enhance customer privacy. In particular, I will consider the questions of subscription, use and billing of services and also address the issue of managing protected content in a hierarchical group
Chauvet, Delphine. "La vie privée : étude de droit privé". Thesis, Paris 11, 2014. http://www.theses.fr/2014PA111006.
Texto completoPrivacy is a jurisprudential notion, recently established by the legislator. Nevertheless, it’s not yet clearly defined. Privacy lies within an utterly variable context. Consequently, its domain and legal system are difficult to determine. However, notions such as intimacy, identity and personality help apprehending the concept of privacy.The evolution of society and the spreading of new technologies have impacts on privacy. Jeopardized, it has to be better protected. French courts and European Court of Human Rights are attempting at this necessity.If privacy is subjected to a right of respect, its dispute isn’t limited to defense. Privacy also contributes to personal development.Yet, right of privacy is relative insofar as it draws antagonist interests, such as general interest and various particular interests.This study contributes to apprehending privacy with regard to the Law
Mance, Bill. "Normal Numbers with Respect to the Cantor Series Expansion". The Ohio State University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=osu1274431587.
Texto completoBeauchamps, Anne. "Des garanties aux atteintes à la liberté individuelle". Nice, 2000. http://www.theses.fr/2000NICE0049.
Texto completoThe most fundamental aspect of freedom is the safety right. The coercive mesure must be forecast by the law and have to be accompanied by a decision of a tribunal. However, in many cases a government official, the Prefect, can decide to detain someone. The preservation of public order can justify this faculty but the legislator have to regulate the conflict of two opposite interests. Many garantees must preserve the dignity of a personn and prevent from the arbitrary detention. Two ways have to be followed : on the one hand, a new and best application of rights, on the other hand, a much improved judicial review
Malherbe, Brice de. "Le respect de la vie humaine dans une éthique de communion : une alternative à la bioéthique à partir de l'attention aux personnes en état végétatif chronique /". [Les Plans (Suisse)] ; [Paris] : Parole et silence, 2006. http://catalogue.bnf.fr/ark:/12148/cb40235833t.
Texto completoDumont, Emmanuel. "La communication de l'Eglise catholique aux Etats-Unis pour le respect de la vie (1990-1995) : genèse, étude mercatique et évaluation éthique d'une rhétorique ecclésiale professionnalisée". Paris 4, 2000. http://www.theses.fr/2000PA040173.
Texto completoSmith, Nicholas. "Private Rule Following and the Principle of Respect for Autonomy". Ohio University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1429884767.
Texto completoSONG, YUKUN SONG. "Stochastic Integrals with Respect to Tempered $\alpha$-Stable Levy Process". Case Western Reserve University School of Graduate Studies / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=case1501506513936836.
Texto completoJudkins, Sarah. "Investigating Civility, Respect, and Engagement in the Workplace (CREW): What Impact Do Selective Process Variables Have on the Success of CREW?" Xavier University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=xavier1511354862410182.
Texto completoDay, Aaron M. "Characterization of Azobenzene Derivatives with Respect to Photoswitching and Aggregation Properties". University of Dayton / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1608140810691289.
Texto completoZofchak, Matthew M. "Reconstructing Respect From the Margins: Towards a More Compassionate Healthcare Politics". Ohio University Honors Tutorial College / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ouhonors1366809109.
Texto completoElchesen, Alex. "Stability of Zigzag Persistence with Respect to a Reflection-type Distance". The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1492707343134983.
Texto completoArfaoui, Ghada. "Conception de protocoles cryptographiques préservant la vie privée pour les services mobiles sans contact". Thesis, Orléans, 2015. http://www.theses.fr/2015ORLE2013/document.
Texto completoThe increasing number of worldwide mobile platforms and the emergence of new technologies such as the NFC (Near Field Communication) lead to a growing tendency to build a user's life depending on mobile phones. This context brings also new security and privacy challenges. In this thesis, we pay further attention to privacy issues in NFC services as well as the security of the mobile applications private data and credentials namely in Trusted Execution Environments (TEE). We first provide two solutions for public transport use case: an m-pass (transport subscription card) and a m-ticketing validation protocols. Our solutions ensure users' privacy while respecting functional requirements of transport operators. To this end, we propose new variants of group signatures and the first practical set-membership proof that do not require pairing computations at the prover's side. These novelties significantly reduce the execution time of such schemes when implemented in resource constrained environments. We implemented the m-pass and m-ticketing protocols in a standard SIM card: the validation phase occurs in less than 300ms whilst using strong security parameters. Our solutions also work even when the mobile is switched off or the battery is flat. When these applications are implemented in TEE, we introduce a new TEE migration protocol that ensures the privacy and integrity of the TEE credentials and user's private data. We construct our protocol based on a proxy re-encryption scheme and a new TEE model. Finally, we formally prove the security of our protocols using either game-based experiments in the random oracle model or automated model checker of security protocols
Paudel, Anju. "PERCEIVED RESPECT IN OHIO NURSING HOMES AND THE FACTORS ASSOCIATED WITH IT". Miami University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=miami1436886459.
Texto completoAng, Ching-E. Nobel. "Respect as awareness of rational nature a modified intellectualist view of Kant's moral psychology /". [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0005361.
Texto completoMessuri, Dominic Anthony. "Optimization of the locomotion of a legged vehicle with respect to maneuverability". The Ohio State University, 1985. http://rave.ohiolink.edu/etdc/view?acc_num=osu1299072069.
Texto completoGanesan, Uma. "Gender and Caste: Self-Respect Movement in the Madras Presidency, 1925-1950". University of Cincinnati / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1321367558.
Texto completoEngerer, Pamela J. "Teacher Actions Secondary Science Students Reckon as Teacher-to-Student Classroom Respect". University of Akron / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=akron1477679722661839.
Texto completoAlajmi, Abdulrahman N. "On The Lattice Size With Respect To The Standard Simplex in 3D". Kent State University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=kent1598893373379275.
Texto completoGunnarsson, David. "Gäst i Sverige : Sanningsregimer, villkorade själv(re)presentationer och nationell tillhörighet vid moskévisningar i Stockholm". Doctoral thesis, Stockholms universitet, Institutionen för etnologi, religionshistoria och genusvetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-129425.
Texto completoFligner, Karen. "Prediction of physical stability in concentrated infant formula with respect to compositional factors /". The Ohio State University, 1990. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487682558445913.
Texto completoHe, Kun. "Content privacy and access control in image-sharing platforms". Thesis, CentraleSupélec, 2017. http://www.theses.fr/2017CSUP0007.
Texto completoIn recent years, more and more users prefer to share their photos through image-sharing platforms. Most of platforms allow users to specify who can access to the images, it may result a feeling of safety and privacy. However, the privacy is not guaranteed, since at least the provider of platforms can clearly know the contents of any published images. According to some existing researches, encrypting images before publishing them, and only the authorised users who can decrypt the encrypted image. In this way, user’s privacy can be protected.There are three challenges when proposing an encryption algorithm for the images published on image-sharing platforms: the algorithm has to preserve image format (e.g. JPEG image) after encryption, the algorithm should be secure (i.e. the adversary cannot get any information of plaintext image from the encrypted image), and the algorithm has to be compatible with basic image processing in each platform. In this thesis, our main goal is to propose an encryption algorithm to protect JPEG image privacy on different image-sharing platforms and overcome the three challenges. We first propose an encryption algorithm which can meet the requirements of the first two points. We then implement this algorithm on several widely-used image-sharing platforms. However, the results show that it cannot recover the plaintext image with a high quality after downloading the image from Facebook, Instagram, Weibo and Wechat. Therefore, we add the correcting mechanism to improve this algorithm, which reduces the losses of image information during uploading the encrypted image on each platform and reconstruct the downloaded images with a high quality
Blackwell, Chelsea Rebecca. "Dressed for Respect? An Investigation of Religiosity, Body Image and Modesty Among Christian Women". The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1461168061.
Texto completo