Literatura académica sobre el tema "Sécurité du système"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Sécurité du système".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Sécurité du système"
Brown, Robert L. "Security for Social Security –Is Privatization the Answer?" Canadian Journal on Aging / La Revue canadienne du vieillissement 16, n.º 3 (1997): 499–518. http://dx.doi.org/10.1017/s071498080000876x.
Texto completoArcari, Maurizio. "Responsabilité de l'État pour violations graves du Droit International et système de sécurité collective des Nations Unies". Anuario Español de Derecho Internacional 21 (16 de agosto de 2018): 415–47. http://dx.doi.org/10.15581/010.21.28397.
Texto completoEl Yacoubi El Idrissi, Houda, Driss Bouami y Abdelghani Cherkaoui. "Système de management intégré vers un référentiel simple et élargi". Revue Française de Gestion Industrielle 29, n.º 1 (1 de marzo de 2010): 7–34. http://dx.doi.org/10.53102/2010.29.01.616.
Texto completoGheroufella, Maya. "Les réformes du système algérien de sécurité sociale face aux mutations du marché du travail : quel rôle dans la sous-couverture sociale ?" les cahiers du cread 38, n.º 3 (3 de septiembre de 2022): 529–54. http://dx.doi.org/10.4314/cread.v38i3.19.
Texto completoWinters, Meghan, Moreno Zanotto y Gregory Butler. "Système de classification du confort et de la sécurité des voies cyclables canadiennes (Can-BICS) : convention d’appellation commune des aménagements cyclables". Promotion de la santé et prévention des maladies chroniques au Canada 40, n.º 9 (septiembre de 2020): 319–24. http://dx.doi.org/10.24095/hpcdp.40.9.04f.
Texto completoGaburici, Angela. "Sécurité alimentaire dans les pays en transition : le cas de la Roumanie". Économies et Sociétés. Série Développement agroalimentaire 29, n.º 322 (1995): 79–90. http://dx.doi.org/10.3406/esag.1995.1692.
Texto completoSalas, Michel, J. Lator y Christian Sheikboudou. "Mise au point d'un système d'engraissement de jeunes bovins Créole en milieu paysan guadeloupéen basé sur l'utilisation de la canne à sucre et du pâturage". Revue d’élevage et de médecine vétérinaire des pays tropicaux 44, n.º 4 (1 de abril de 1991): 469–74. http://dx.doi.org/10.19182/remvt.9155.
Texto completoAlpher, Joseph. "Israël, Jordanie, Palestine : un système de sécurité". Politique étrangère 57, n.º 4 (1992): 809–23. http://dx.doi.org/10.3406/polit.1992.4149.
Texto completoRoșioru, Felicia. "La réforme du système de sécurité sociale". Revue de droit comparé du travail et de la sécurité sociale, n.º 1 (1 de abril de 2018): 180–81. http://dx.doi.org/10.4000/rdctss.2060.
Texto completoMpia, Héritier Nsenge. "De la vulnérabilité des informations numériques dans les réseaux informatiques : Cas de l'infiltration à travers le rootkit". Revue Internationale Multidisciplinaire Etincelle 21, n.º 1 (10 de julio de 2018): 1–13. http://dx.doi.org/10.61532/rime211111.
Texto completoTesis sobre el tema "Sécurité du système"
Dhifallah, Mohamed Kamel. "Le système de sécurité sociale en Tunisie au regard du système de Sécurité Sociale en France". Bordeaux 1, 1995. http://www.theses.fr/1995BOR1D006.
Texto completoWe are going to make a comparaison between the french health care system and the tunisian health care system so as to analyse the latter. The social legislationn in tunisia, influenced by the french legislation came into existence carly in tunisia under the protectorat regime. But once the country became independent, the tunisian system was unable to follow the breaking off between the two systems. However, this did not prevent the instauration of a cooperation between the two sytems. Indeed, the health care general convention signed by both countries in 1965, is a good means of cooperation. In spite of the economic crisis striking the two countries, the two systemes should keep this degree of cooperation and try to improve it if possible. The exemple of the french-european cooperation as far as social security is concerned is to be followed
Dhifallah, Mohamed Kamel. "Le système de sécurité sociale en Tunisie au regard du système de Sécurité Sociale en France". Bordeaux 1, 1995. http://www.theses.fr/1995BOR40006.
Texto completoWe are going to make a comparaison between the french health care system and the tunisian health care system so as to analyse the latter. The social legislationn in tunisia, influenced by the french legislation came into existence carly in tunisia under the protectorat regime. But once the country became independent, the tunisian system was unable to follow the breaking off between the two systems. However, this did not prevent the instauration of a cooperation between the two sytems. Indeed, the health care general convention signed by both countries in 1965, is a good means of cooperation. In spite of the economic crisis striking the two countries, the two systemes should keep this degree of cooperation and try to improve it if possible. The exemple of the french-european cooperation as far as social security is concerned is to be followed
Dagorn, Nathalie. "Management de la sécurité de l'information : mise en oeuvre, évaluation et pilotage de la sécurité de l'information dans les organisations". Thesis, Nancy 2, 2011. http://www.theses.fr/2011NAN22006.
Texto completoThis thesis addresses the problem of information security management within organizations. Through a series of theoretical and empirical analyses, it proposes (i) an exploratory model of the engagement of organizations in the governance of information security based on the Unified Theory of Acceptance and Use of Technology by Venkatesh et al. (2003), (ii) a quantitative decision model for evaluation and forecasting of information security based on game theory by Von Neumann and Morgenstern (1944) in its stochastic version formalized by Shapley (1953), and (iii) a model of balanced scorecard using the original method of Kaplan and Norton (1992) for performance measurement and management of information security. Various methodological approaches have been applied to test these proposals, including a questionnaire survey (120 respondents), a brainstorming with votes (68 participants), an in-depth case study, two ex post analyses of fifteen security projects, a Metaplan session (32 participants), and a longitudinal case study. Our research results in an undeniable advance in traditional management models for information security, made possible by the use of interdisciplinary theoretical and methodological bases. In practice, the research provides the decision maker with a comprehensive framework for the management of information security, enabling him to engage the organization knowingly in the process, to evaluate its security status and establish forecasts or comparisons, to control and continuously improve the management of information security within the organization, and ultimately to contribute to the organization's overall performance and competitiveness
Goudalo, Wilson. "Vers une ingénierie avancée de la sécurité des systèmes d'information d'entreprise : une approche conjointe de la sécurité, de l'utilisabilité et de la résilience dans les systèmes sociotechniques". Thesis, Valenciennes, 2017. http://www.theses.fr/2017VALE0026/document.
Texto completoIn our era of the service industry, information systems play a prominent role. They even hold a vital position for businesses, organizations and individuals. Information systems are confronted with new security threats on an ongoing basis; these threats become more and more sophisticated and of different natures. In this context, it is important to prevent attackers from achieving their results, to manage the inevitable flaws, and to minimize their impacts. Security practices must be carried out within an engineering framework; Security engineering needs to be improved. To do this, it is proposed to develop systemic approaches, innovative on wide spectra and that work on several axes together, improving the user experience. Our goal is to jointly track down and resolve issues of security, usability and resiliency in enterprise information systems. In this doctoral thesis, we position sociotechnical systems in relation to the information systems of companies and organizations. We address paradigms of sociotechnical systems and refocus on the correlations between security, usability and resilience. A case study illustrates the proposed approach. It presents the development of design patterns to improve the user experience. The thesis concludes with an overall discussion of the approach, as well as research perspectives
Millon, Etienne. "Analyse de sécurité de logiciels système par typage statique". Phd thesis, Université Pierre et Marie Curie - Paris VI, 2014. http://tel.archives-ouvertes.fr/tel-01067475.
Texto completoMillon, Etienne. "Analyse de sécurité de logiciels système par typage statique". Electronic Thesis or Diss., Paris 6, 2014. http://www.theses.fr/2014PA066120.
Texto completoOperating system kernels need to manipulate data that comes from user programs through system calls. If it is done in an incautious manner, a security vulnerability known as the Confused Deputy Problem can lead to information disclosure or privilege escalation. The goal of this thesis is to use static typing to detect the dangerous uses of pointers that are controlled by userspace. Most operating systems are written in the C language. We start by isolating Safespeak, a safe subset of it. Its operational semantics as well as a type system are described, and the classic properties of type safety are established. Memory states are manipulated using bidirectional lenses, which can encode partial updates to states and variables. A first analysis is described, that identifies integers used as bitmasks, which are a common source of bugs in C programs. Then, we add to Safespeak the notion of pointers coming from userspace. This breaks type safety, but it is possible to get it back by assigning a different type to the pointers that are controlled by userspace. This distinction forces their dereferencing to be done in a controlled fashion. This technique makes it possible to detect two bugs in the Linux kernel: the first one is in a video driver for an AMD video card, and the second one in the ptrace system call for the Blackfin architecture
Guts, Nataliya. "Auditabilité pour les protocoles de sécurité". Paris 7, 2011. http://www.theses.fr/2011PA077004.
Texto completoSecurity protocols often log some data available at runtime for an eventual a posteriori analysis, called audit. In practice, audit procedures remain informal, and the choice of log contents is left to the programmer's common sense. The goal of this dissertation is to formalize and verify the properties expected from audit ! logs. First we consider the use of logs in so called optimistic security protocols which, as opposed to classic security protocols, rely on the logs to postpone certain security checks until the end of execution. We formally study two optimistic schemes: value commitment scheme and offline e-cash; using process languages techniques, we prove that the information logged by their implementations suffices to detect the cheat of participants, if any. Then we define auditability as the ability of a protocol to collect enough evidence to convince an audit ! procedure (judge). We propose a method based on types with logical refinements to verify auditability, and ; implement it as an extension to an existing typechecker. We show that verifying auditability boils down to typechecking the protocol implementation. We also implement logical support for generic pre- and post-! conditions to enhance modular typechecking of higher-order functions
Bouchiba, Anass. "Evaluation de dysfonctionnement d'un système par approche bayesienne : cas du système ferroviaire". Angers, 2013. http://tel.archives-ouvertes.fr/tel-00842756.
Texto completoThe development of railway in urban and non urban, is accompanied by recess continuous improvement of safety, which remains a primary concern in this area of transport, where accidents continue to cause significant damage, and cause a large number of victims. The control of risks of rail transport implies firstly the identification and prediction of risk, and secondly, reducing these risks by acting on ways to decrease their occurrence, their severity, mitigating their consequences by means of avoidance and protection against risks. In this context, the present work of this thesis is to develop an assessment tool and risk analysis at Level Crossings of the Moroccan railway network, which has 521 level crossings with about 80% are not guarded, and the railway network of tram in the cities of Rabat/Salé, which extends on 20 km and which its urban integration has not been without effect on the city, because accidents between the tram and road users whether pedestrians or vehicles, continue to occur and recorded about ten accidents per month of varying severity. The risk analysis of these two systems is based primarily on the functional and dysfunctional studies, then secondly on risk modelling by Bayesian Networks. In fact, the Bayesian approach in evaluating dysfunctions and quantification of the risks constitutes an analysis approach allowing taking into account the behavioural and temporal aspects of the system (events related to human factors or equipment, of random events of accidents, uncontrolled consequences of accidents etc. ). The risk model proposed also allows for a risk prediction based on data collected from the past (feedback)
Luang, Aphay Jean Siri. "Quelle confiance pour améliorer la sécurité du système d'information ? Contribution à une modélisation de la sécurité des systèmes d'information socio-techniques". Compiègne, 2004. http://www.theses.fr/2004COMP1527.
Texto completoInformation security rests on important technical means whose organisational and social insertion is often retumed to the steps of sensitising. Our investigations show that the training of safety forms part of a strategie global training and located. The practice of safety is indexed with a system of constraints, individual and collective objectives sometimes divergent and intentions. Ln comparison with the priorities that the individual builds itself, safety thus takes a variable weight likely to be negotiated at every moment. Safety is thus not a process but a training of installations which the actors and the threats around the apparent but nonexclusive form operate which is the organization. The piloting of safety supposes permanent construction and update of a representation of the regulations of the complex information system. This building work requires to invest the local margins of appropriation by confidence, thus making it possible to make profitable the company richness
Nonju, Samuel Abieboye. "Le Nigéria dans le système de sécurité africaine et internationale". Paris 10, 1991. http://www.theses.fr/1991PA100052.
Texto completoThe build-up of destructive weapons particularly in the African context by the racist regime of Pretoria whose nuclear ambition remained unchecked, and as well in their international context by the superpowers' accumulation of sophisticated nuclear arsenal in an area of detente, have created a spiral of questions in the minds of Nigerian political leaders whose prescriptions involve : the formulation of strategic objectives and choices to safeguard the territorial integrity and national sovereignty. Nigerian government's identification and analysis of the dangers of an eventual nuclear war and its subsequent after effects have prompted the actual president - General Ibrahim Babangida's famous question with regards to "how Nigeria could match her goals and interests in such an uncertain world dominated by the superpowers. . . And what would be her position in such a world. . . " however, the relative political stability in Nigeria constitutes an indispensable entity upon which the decision makers ought to define concretely national security options compatible to Nigeria and her sister countries interests in the region, thereby creating a "sine-quoi-non" for peace, economic development and regional security. Although nothing in the present study contradicts Nigeria’s political determination to go nuclear, the question is whether this could be interpreted as an end or a continuation of her global politics in the international scene. It follows that in spite of both financial and technological handicaps in an era of detente between the two superpowers, successive Nigerian governments have opted for the acquisition of nuclear weapons for the security of her 155 million people, the territorial integrity and national sovereignty in the year 2000
Libros sobre el tema "Sécurité du système"
Drollet, Solange. Le système polynésien de sécurité sociale. Marseille: Presses universitaires d'Aix-Marseille, 1996.
Buscar texto completoLaure, Mandeville y France Documentation française, eds. Russie: quel système de sécurité?: Les ministères d'autorité. Paris: Documentation française, 1997.
Buscar texto completoRouabhi, Mohamed. Le système de sécurité sociale en Algérie: Évolution historique. Alger: El Dar El Othmania, 2010.
Buscar texto completoTorjman, Sherri Resin. Le revenu précaire: Le système de pensions d'invalidité au Canada. Downsview, Ont: Institut G. Allan Roeher, 1988.
Buscar texto completoEssais sur l'Europe et le système international: Crise, multilatéralisme et sécurité. Paris: Harmattan, 2011.
Buscar texto completoMampuya Kanunk'a Tshiabo, writer of preface, ed. Région des Grands Lacs: Dynamique des conflits et système de sécurité collective. Kinshasa: L'Harmattan RDCongo, 2021.
Buscar texto completoKGB connexion: Le système Poutine. Paris: Editions Hors commerce, 2004.
Buscar texto completoPooter, Hélène de. Le droit international face aux pandémies: Vers un système de sécurité sanitaire collective. Paris: Pedone, 2015.
Buscar texto completoBennasar, Matthieu. Plan de continuité d'activité et système d'information: Vers l'entreprise résiliente. Paris: Dunod, 2006.
Buscar texto completoStewart, Ron W. Système d'avertissement de l'approche d'un autre train aux passages à niveau. Montréal, Qué: Centre de développement des transports, 2004.
Buscar texto completoCapítulos de libros sobre el tema "Sécurité du système"
Ross, Friso. "Safeguarding the Constitutional Function of the Occupational Pension System". En Steuerung der betrieblichen Altersversorgung in Europa: garantierte Sicherheit? Governance of Occupational Pensions in Europe: Guaranteed Security? Gouvernance des retraites professionnelles en Europe: Sécurité garantie?, 223–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-15731-8_17.
Texto completoSol, Marion. "Les systèmes de retraite au révélateur de la crise financière : quels enseignements pour les retraites d’entreprise en France ?" En Steuerung der betrieblichen Altersversorgung in Europa: garantierte Sicherheit? Governance of Occupational Pensions in Europe: Guaranteed Security? Gouvernance des retraites professionnelles en Europe: Sécurité garantie?, 271–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-15731-8_20.
Texto completo"Chapitre 6 - Sécurité et politique alimentaires". En Le système alimentaire mondial, 407–89. Éditions Quæ, 2010. http://dx.doi.org/10.3917/quae.rasto.2010.01.0407.
Texto completoZHANG, Hanwei, Teddy FURON, Laurent AMSALEG y Yannis AVRITHIS. "Attaques et défenses de réseaux de neurones profonds : le cas de la classification d’images". En Sécurité multimédia 1, 51–85. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9026.ch2.
Texto completoLEFÈVRE, Pascal, Philippe CARRÉ y David ALLEYSSON. "Invisibilité". En Sécurité multimédia 1, 137–69. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9026.ch4.
Texto completoFavez, Nicolas. "Chapitre 9. Le système de sécurité émotionnelle". En L'examen clinique de la famille, 247–73. Mardaga, 2020. http://dx.doi.org/10.3917/mard.favez.2020.01.0247.
Texto completoMENDIBOURE, Léo, Mohamed Aymen CHALOUF y Francine KRIEF. "Vers de nouvelles architectures intelligentes pour l’Internet des véhicules". En Gestion et contrôle intelligents des réseaux, 205–29. ISTE Group, 2020. http://dx.doi.org/10.51926/iste.9008.ch8.
Texto completo"Le contrôle d’accès et la sécurité du système d’exploitation". En La sécurité logicielle: une approche défensive, 235–54. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.10.
Texto completoCHABRIDON, Vincent, Mathieu BALESDENT, Guillaume PERRIN, Jérôme MORIO, Jean-Marc BOURINET y Nicolas GAYTON. "Analyse de sensibilité globale ciblée pour la fiabilité en présence d’incertitudes sur les paramètres de distribution". En Ingénierie mécanique en contexte incertain, 255–304. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9010.ch7.
Texto completoSkogan, Wesley G. "Chapitre 1. Les difficultés de réformer le système policier aux États-Unis". En Réformer la police et la sécurité, 39–57. Odile Jacob, 2004. http://dx.doi.org/10.3917/oj.roche.2004.01.0039.
Texto completoActas de conferencias sobre el tema "Sécurité du système"
Delatour, G., P. Laclémence, D. Calcei y C. Mazri. "Système de gestion de la sécurité : quel espace critique pour la décision d’anticipation ?" En Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56122.
Texto completoGaufreteau, P. y G. Farizon. "Sécurité globale des fonctions de signalisation d’un tramway incluant le système technique et les opérateurs". En Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56128.
Texto completoLe Baut-Ferrarese, Bernadette. "La transition énergétique : enjeux juridiques. Partie 1 : La transition énergétique à l'épreuve du droit". En MOlecules and Materials for the ENergy of TOMorrow. MSH Paris-Saclay Éditions, 2021. http://dx.doi.org/10.52983/npyt7969.
Texto completoPerinet, R. y N. Taib. "Prendre en compte les facteurs humains et organisationnels dans la conception d’un système de sécurité interactif innovant". En Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56223.
Texto completoBrissaud, Florent y Didier Turcinovic. "Sécurité fonctionnelle des systèmes relatifs à la sécurité : 10 erreurs à éviter". En Congrès Lambda Mu 20 de Maîtrise des Risques et de Sûreté de Fonctionnement, 11-13 Octobre 2016, Saint Malo, France. IMdR, 2016. http://dx.doi.org/10.4267/2042/61703.
Texto completoBoulanger, J.-L. y L. Zhao. "Sécurité, confidentialité et intégrité dans les systèmes ferroviaires". En Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56197.
Texto completoMussat, L. y D. Sabatier. "Modélisation et preuve de sécurité des systèmes du transport ferroviaire". En Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56145.
Texto completoHoudebine, Jean-Claude, Anne Flori, Gilbert Durand y Hervé Fargetton. "Sûreté de fonctionnement, sécurité des systèmes d'information et survivabilité des systèmes de systèmes". En Congrès Lambda Mu 20 de Maîtrise des Risques et de Sûreté de Fonctionnement, 11-13 Octobre 2016, Saint Malo, France. IMdR, 2016. http://dx.doi.org/10.4267/2042/61698.
Texto completoSignoret, J.-P. y R. Ostebo. "Norme ISO TR 12489 : modélisation et calcul fiabilistes des systèmes de sécurité". En Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56238.
Texto completoCaire, J. "Vers un cycle de vie de sécurité globale pour les systèmes informatiques industriels". En Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56195.
Texto completoInformes sobre el tema "Sécurité du système"
Marsden, Eric, Romuald Perinet y Jean Pariès. Articulation des sphères réglées et gérées de la sécurité industrielle. Fondation pour une Culture de Sécurité Industrielle, mayo de 2024. http://dx.doi.org/10.57071/rgr871.
Texto completoCuvelier, Lucie. Agir face aux risques, regard de l’ergonomie. Fondation pour une culture de sécurité industrielle, mayo de 2016. http://dx.doi.org/10.57071/332rge.
Texto completoTea, Céline. REX et données subjectives: quel système d'information pour la gestion des risques? Fondation pour une culture de sécurité industrielle, abril de 2012. http://dx.doi.org/10.57071/170rex.
Texto completoRigaud, Éric. Résilience et management de la sécurité: pistes pour l’innovation en sécurité industrielle. Fondation pour une culture de sécurité industrielle, septiembre de 2011. http://dx.doi.org/10.57071/469rig.
Texto completoKamaté, Caroline. Le monde change, la sécurité industrielle aussi: Humain, numérique, nouvelles organisations: 10 points-clés à l’horizon 2040. Fondation pour une culture de sécurité industrielle, mayo de 2023. http://dx.doi.org/10.57071/240dpc.
Texto completoFlandin, Simon, Germain Poizat y Romuald Perinet. Proactivité et réactivité: deux orientations pour concevoir des dispositifs visant le développement de la sécurité industrielle par la formation. Fondation pour une culture de sécurité industrielle, febrero de 2021. http://dx.doi.org/10.57071/948rpn.
Texto completoRohwerder, Brigitte. Soutien équitable pour les moyens de subsistance et la nourriture. Institute of Development Studies, noviembre de 2023. http://dx.doi.org/10.19088/core.2023.010.
Texto completo