Literatura académica sobre el tema "Sécurité des applications"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Sécurité des applications".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Sécurité des applications"
Pellet, Rémi. "L’articulation des lois financières entre elles et avec les lois ordinaires À propos d’une certaine « inculture constitutionnelle »". Gestion & Finances Publiques, n.º 6 (noviembre de 2023): 30–35. http://dx.doi.org/10.3166/gfp.2023.6.005.
Texto completoLatulippe, Gérard P. y Kevin O’Farrell. "Le comité paritaire : anachronisme ou formule d’avenir". Relations industrielles 37, n.º 3 (12 de abril de 2005): 634–55. http://dx.doi.org/10.7202/029283ar.
Texto completoSaoudi, Messaoud. "Le contrôle des principes budgétaires applicables aux lois de financement de la Sécurité sociale". Gestion & Finances Publiques, n.º 6 (noviembre de 2023): 15–22. http://dx.doi.org/10.3166/gfp.2023.6.003.
Texto completoRenaut, Éric. "L’ Eurocorps : un modèle de synergie pour les applications européennes de sécurité et de défense ?" Revue Défense Nationale N° 867, n.º 2 (12 de febrero de 2024): 93–98. http://dx.doi.org/10.3917/rdna.867.0093.
Texto completoAllaert, François-André, Noël-Jean Mazen, Louis Legrand y Catherine Quantin. "Les enjeux de la sécurité des objets connectés et applications de santé". Journal de gestion et d'économie médicales 34, n.º 5 (2016): 311. http://dx.doi.org/10.3917/jgem.165.0311.
Texto completoOlsson, Christian. "De la sécurité à la violence organisée : tropismes et points aveugles de « l’école de Copenhague »". Études internationales 46, n.º 2-3 (11 de febrero de 2016): 211–30. http://dx.doi.org/10.7202/1035178ar.
Texto completoÖnen, Melek, Francesco Cremonesi y Marco Lorenzi. "Apprentissage automatique fédéré pour l’IA collaborative dans le secteur de la santé". Revue internationale de droit économique XXXVI, n.º 3 (21 de abril de 2023): 95–113. http://dx.doi.org/10.3917/ride.363.0095.
Texto completoDufour, Anne Claire. "Le contrôle des dispositions des lois de financement de la Sécurité sociale Les « cavaliers sociaux »". Gestion & Finances Publiques, n.º 6 (noviembre de 2023): 23–29. http://dx.doi.org/10.3166/gfp.2023.6.004.
Texto completoDort, Aurélie. "Le contrôle des modalités d’adoption des lois de financement de la Sécurité sociale, l’illustration d’un équilibre d’apparence". Gestion & Finances Publiques, n.º 6 (noviembre de 2023): 7–14. http://dx.doi.org/10.3166/gfp.2023.6.002.
Texto completoZeller, Olivia, Célia Guimberteau y Samuel Pouplin. "Objets connectés : facilitateurs d’une plus grande indépendance". Contraste N° 57, n.º 1 (20 de marzo de 2023): 51–62. http://dx.doi.org/10.3917/cont.057.0051.
Texto completoTesis sobre el tema "Sécurité des applications"
Cherif, Amina. "Sécurité des RFIDs actifs et applications". Thesis, Limoges, 2021. http://www.theses.fr/2021LIMO0015.
Texto completoOver the 30 last years, active RFID devices have evolved from nodes dedicated to identification to autonomous nodes that, in addition, sense (from environment or other sources) and exchange data. Consequently, the range of their applications has rapidly grown from identification only to monitoring and real time localisation. In recent years, thanks to their advantages, the use of active RFID nodes for mobile data collection has attracted significant attention. However, in most scenarios, these nodes are unattended in an adverse environments, so data must be securely stored and transmitted to prevent attack by active adversaries: even if the nodes are captured, data confidentiality must be ensured. Furthermore, due to the scarce resources available to nodes in terms of energy, storage and/or computation, the used security solution has to be lightweight. This thesis is divided in two parts. In the first, we will study in details the evolution of active RFID nodes and their security. We will then, present, in the second part, a new serverless protocol to enable MDCs (Mobile Data Collectors), such as drones, to collect data from mobile and static Active RFID nodes and then deliver them later to an authorized third party. The whole solution ensures data confidentiality at each step (from the sensing phase, before data collection by the MDC, once data have been collected by MDC, and during final delivery) while fulfilling the lightweight requirements for the resource-limited entities involved. To assess the suitability of the protocol against the performance requirements, we will implement it on the most resource-constrained secure devices to prove its efficiency even in the worst conditions. In addition, to prove the protocol fulfills the security requirements, we will analyze it using security games and we will also formally verify it using the AVISPA and ProVerif tools
Luo, Zhengqin. "Sémantique et sécurité des applications Web". Nice, 2011. http://www.theses.fr/2011NICE4058.
Texto completoIn this work we study the formal semantics and security problems of Web applications. The thesis is divided into three parts. The first part proposes a small-step operational semantics for a multitier programing language HOP, which can be used to globally reasoning about Web applications. The semantics covers a core of the HOP language, including dynamic generations of client code, and interactions between servers and clients. The second part studies a new technique to automatically prevent code injection attacks, based on multitier compilation. We add a new phase in the compiler to compare the intended and the actual syntax structure of the output. The validity of our technique is proved correct in the operational semantics of HOP. The last part of the thesis studies Mashic, a source-to-source compiler of JavaScript to isolate untrusted script by ifram sandbox and postmessage in HTML5. The compiler is proved correct in a formal semantics of JavaScript
Vayssière, Julien. "Une architecture de sécurité pour les applications réflexives : application à Java". Nice, 2002. http://www.theses.fr/2002NICE5772.
Texto completoHadhiri, Amine. "Sécurité des applications androïde : menaces et contre-mesures". Mémoire, École de technologie supérieure, 2012. http://espace.etsmtl.ca/1008/1/HADHIRI_Amine.pdf.
Texto completoSomé, Dolière Francis. "Sécurité et vie privée dans les applications web". Thesis, Université Côte d'Azur (ComUE), 2018. http://www.theses.fr/2018AZUR4085/document.
Texto completoIn this thesis, we studied security and privacy threats in web applications and browser extensions. There are many attacks targeting the web of which XSS (Cross-Site Scripting) is one of the most notorious. Third party tracking is the ability of an attacker to benefit from its presence in many web applications in order to track the user has she browses the web, and build her browsing profile. Extensions are third party software that users install to extend their browser functionality and improve their browsing experience. Malicious or poorly programmed extensions can be exploited by attackers in web applications, in order to benefit from extensions privileged capabilities and access sensitive user information. Content Security Policy (CSP) is a security mechanism for mitigating the impact of content injection attacks in general and in particular XSS. The Same Origin Policy (SOP) is a security mechanism implemented by browsers to isolate web applications of different origins from one another. In a first work on CSP, we analyzed the interplay of CSP with SOP and demonstrated that the latter allows the former to be bypassed. Then we scrutinized the three CSP versions and found that a CSP is differently interpreted depending on the browser, the version of CSP it implements, and how compliant the implementation is with respect to the specification. To help developers deploy effective policies that encompass all these differences in CSP versions and browsers implementations, we proposed the deployment of dependency-free policies that effectively protect against attacks in all browsers. Finally, previous studies have identified many limitations of CSP. We reviewed the different solutions proposed in the wild, and showed that they do not fully mitigate the identified shortcomings of CSP. Therefore, we proposed to extend the CSP specification, and showed the feasibility of our proposals with an example of implementation. Regarding third party tracking, we introduced and implemented a tracking preserving architecture, that can be deployed by web developers willing to include third party content in their applications while preventing tracking. Intuitively, third party requests are automatically routed to a trusted middle party server which removes tracking information from the requests. Finally considering browser extensions, we first showed that the extensions that users install and the websites they are logged into, can serve to uniquely identify and track them. We then studied the communications between browser extensions and web applications and demonstrate that malicious or poorly programmed extensions can be exploited by web applications to benefit from extensions privileged capabilities. Also, we demonstrated that extensions can disable the Same Origin Policy by tampering with CORS headers. All this enables web applications to read sensitive user information. To mitigate these threats, we proposed countermeasures and a more fine-grained permissions system and review process for browser extensions. We believe that this can help browser vendors identify malicious extensions and warn users about the threats posed by extensions they install
Mouelhi, Tejeddine. "Modélisation et test de mécanismes de sécurité dans des applications internet". Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-00544431.
Texto completoMakiou, Abdelhamid. "Sécurité des applications Web : Analyse, modélisation et détection des attaques par apprentissage automatique". Thesis, Paris, ENST, 2016. http://www.theses.fr/2016ENST0084/document.
Texto completoWeb applications are the backbone of modern information systems. The Internet exposure of these applications continually generates new forms of threats that can jeopardize the security of the entire information system. To counter these threats, there are robust and feature-rich solutions. These solutions are based on well-proven attack detection models, with advantages and limitations for each model. Our work consists in integrating functionalities of several models into a single solution in order to increase the detection capacity. To achieve this objective, we define in a first contribution, a classification of the threats adapted to the context of the Web applications. This classification also serves to solve some problems of scheduling analysis operations during the detection phase of the attacks. In a second contribution, we propose an architecture of Web application firewall based on two analysis models. The first is a behavioral analysis module, and the second uses the signature inspection approach. The main challenge to be addressed with this architecture is to adapt the behavioral analysis model to the context of Web applications. We are responding to this challenge by using a modeling approach of malicious behavior. Thus, it is possible to construct for each attack class its own model of abnormal behavior. To construct these models, we use classifiers based on supervised machine learning. These classifiers use learning datasets to learn the deviant behaviors of each class of attacks. Thus, a second lock in terms of the availability of the learning data has been lifted. Indeed, in a final contribution, we defined and designed a platform for automatic generation of training datasets. The data generated by this platform is standardized and categorized for each class of attacks. The learning data generation model we have developed is able to learn "from its own errors" continuously in order to produce higher quality machine learning datasets
Serme, Gabriel. "Modularisation de la sécurité informatique dans les systèmes distribués". Electronic Thesis or Diss., Paris, ENST, 2013. http://www.theses.fr/2013ENST0063.
Texto completoAddressing security in the software development lifecycle still is an open issue today, especially in distributed software. Addressing security concerns requires a specific know-how, which means that security experts must collaborate with application programmers to develop secure software. Object-oriented and component-based development is commonly used to support collaborative development and to improve scalability and maintenance in software engineering. Unfortunately, those programming styles do not lend well to support collaborative development activities in this context, as security is a cross-cutting problem that breaks object or component modules. We investigated in this thesis several modularization techniques that address these issues. We first introduce the use of aspect-oriented programming in order to support secure programming in a more automated fashion and to minimize the number of vulnerabilities in applications introduced at the development phase. Our approach especially focuses on the injection of security checks to protect from vulnerabilities like input manipulation. We then discuss how to automate the enforcement of security policies programmatically and modularly. We first focus on access control policies in web services, whose enforcement is achieved through the instrumentation of the orchestration mechanism. We then address the enforcement of privacy protection policies through the expert-assisted weaving of privacy filters into software. We finally propose a new type of aspect-oriented pointcut capturing the information flow in distributed software to unify the implementation of our different security modularization techniques
Fila, Barbara. "Automates pour l'analyse de documents XML compressés, applications à la sécurité d'accès". Phd thesis, Université d'Orléans, 2008. http://tel.archives-ouvertes.fr/tel-00491193.
Texto completoFila-Kordy, Barbara. "Automates pour l'analyse de documents XML compressés, applications à la sécurité d'accès". Orléans, 2008. http://www.theses.fr/2008ORLE2029.
Texto completoLibros sobre el tema "Sécurité des applications"
A, Benwell-Morison Deirdre y Canada. Direction de l'hygiène du milieu., eds. Principes d'utilisation des ultrasons: Partie II. Applications industrielles et commerciales. Ottawa, Ont: Direction de l'hygiène du milieu, 1991.
Buscar texto completoBly, Stephen Howard Perry. Principes d'utilisation des ultrasons: 1re partie. Applications médicales et paramédicales. Ottawa, Ont: Direction de l'hygiène du milieu, 1989.
Buscar texto completoAmerican Society of Safety Engineers, ed. The safety professionals handbook: Management applications. 2a ed. Des Plaines, Ill: American Society of Safety Engineers, 2012.
Buscar texto completo(Firm), BP y Institution of Chemical Engineers (Great Britain), eds. Hazards of air and oxygen. 8a ed. Rugby, UK: IChemE, 2004.
Buscar texto completoMike, Shema, ed. Hacking exposed: Web applications. New York: McGraw-Hill/Osborne, 2002.
Buscar texto completoScambray, Joel. Hacking exposed: Web applications. New York: McGraw-Hill/Osborne, 2002.
Buscar texto completoCordoliani, Y. S. Radioprotection en milieu médical. Paris: Masson, 2005.
Buscar texto completoOccupational ergonomics: Theory and applications. 2a ed. Boca Raton, FL: Taylor & Francis, 2012.
Buscar texto completoCryptography for Internet and database applications: Developing secret and public key techniques with Java. Indianapolis, Ind: Wiley Pub., 2002.
Buscar texto completo(Firm), BP y Institution of Chemical Engineers (Great Britain), eds. Hazards of water. 8a ed. Rugby: Institution of Chemical Engineers, 2004.
Buscar texto completoCapítulos de libros sobre el tema "Sécurité des applications"
CHARRIER, Christophe, Christophe ROSENBERGER y Amine NAIT-ALI. "Biométrie et applications". En Sécurité multimédia 2, 9–40. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9027.ch1.
Texto completoSYLLA, Tidiane, Mohamed-Aymen CHALOUF y Francine KRIEF. "Adaptation du niveau de sécurité des applications IoT". En La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 251–75. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch10.
Texto completoBEUGNON, Sébastien, Pauline PUTEAUX y William PUECH. "Partage d’images et d’objets 3D secrets". En Sécurité multimédia 2, 279–312. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9027.ch8.
Texto completoMBAYE, Maïssa y Omessaad HAMDI. "Un plan de contrôle intelligent pour le déploiement de services de sécurité dans les réseaux SDN". En Gestion et contrôle intelligents des réseaux, 29–67. ISTE Group, 2020. http://dx.doi.org/10.51926/iste.9008.ch2.
Texto completoSEMMOUD, Abderrazaq y Badr BENMAMMAR. "La sécurité intelligente des réseaux informatiques". En Gestion et contrôle intelligents des réseaux, 5–28. ISTE Group, 2020. http://dx.doi.org/10.51926/iste.9008.ch1.
Texto completoWAHL, Martine y Patrick SONDI. "Enjeux autour des communications ad hoc sur la route". En Conception et évaluation de protocole de routage ad hoc, 5–15. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9112.ch1.
Texto completoSAMMOUD, Amal, Omessaad HAMDI, Mohamed-Aymen CHALOUF y Nicolas MONTAVONT. "Apports de la biométrie et de l’intelligence artificielle dans la sécurisation de l’IoT". En La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 205–30. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch8.
Texto completoAYMEN CHALOUF, Mohamed, Hana MEJRI y Omessaad HAMDI. "Intelligence artificielle pour la sécurité en e-santé". En Gestion de la sécurité en e-santé, 213–35. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9179.ch9.
Texto completoLAHSINI, Cyrine, Faiza HAMDI y Omessaad HAMDI. "Application de la blockchain dans la e-santé". En Gestion de la sécurité en e-santé, 107–36. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9179.ch5.
Texto completoLATA, Manju y Vikas KUMAR. "La sécurité des réseaux IdO dans la maison connectée". En Cybersécurité des maisons intelligentes, 163–84. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch4.
Texto completo