Literatura académica sobre el tema "Sécurité et confidentialité"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Sécurité et confidentialité".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Sécurité et confidentialité"
Jay, Nicolas y Marc Koehler. "Sécurité et confidentialité des données de traçabilité en milieu de soins". Interbloc 36, n.º 3 (julio de 2017): 153–56. http://dx.doi.org/10.1016/j.bloc.2017.07.005.
Texto completoDaho, Grégory, Emmanuel-Pierre Guittet y Julien Pomarède. "Les territoires du secret : confidentialité et enquête dans les mondes pluriels de la sécurité". Cultures & conflits, n.º 118 (1 de diciembre de 2020): 7–17. http://dx.doi.org/10.4000/conflits.21827.
Texto completoDaho, Grégory, Emmanuel-Pierre Guittet y Julien Pomarède. "Les territoires du secret : confidentialité et enquête dans les mondes pluriels de la sécurité". Cultures & conflits, n.º 118 (1 de diciembre de 2020): 7–17. http://dx.doi.org/10.4000/conflits.21827.
Texto completoTesta, Valerie, Alexandria Bennett, Jeffrey Jutai, Zachary Cantor, Peter Burke, James McMahon, R. Nicholas Carleton et al. "Application du cadre Theoretical Domains Framework pour cerner les préférences des policiers, des pompiers et des ambulanciers en matière d’accès aux soins de santé mentale dans une clinique de traitement des blessures de stress opérationnel pour les premiers répondants : une étude qualitative". Promotion de la santé et prévention des maladies chroniques au Canada 43, n.º 10/11 (noviembre de 2023): 481–502. http://dx.doi.org/10.24095/hpcdp.43.10/11.02f.
Texto completoMarsico, G. "Numérique, virtuel, réseaux sociaux, objets connectés : leviers ou freins à la confiance dans la relation de soins ?" Psycho-Oncologie 14, n.º 1-2 (marzo de 2020): 53–56. http://dx.doi.org/10.3166/pson-2020-0123.
Texto completoÖnen, Melek, Francesco Cremonesi y Marco Lorenzi. "Apprentissage automatique fédéré pour l’IA collaborative dans le secteur de la santé". Revue internationale de droit économique XXXVI, n.º 3 (21 de abril de 2023): 95–113. http://dx.doi.org/10.3917/ride.363.0095.
Texto completoGusev, Alexander, Arnaud Leconte y Simone Lucatello. "Green Digital Transition and Data Governance". L'Europe en Formation 396, n.º 1 (13 de noviembre de 2023): 59–83. http://dx.doi.org/10.3917/eufor.396.0059.
Texto completoTschudi, Hunziker, Kündig, Lüscher, Freiermuth, Heller y Heberer. "Internet-Kommunikation zwischen Hausärzten und Universitätsspital". Praxis 91, n.º 7 (1 de febrero de 2002): 257–60. http://dx.doi.org/10.1024/0369-8394.91.7.257.
Texto completoBarry, Bridget, Rosemary Ricciardelli y Heidi Cramm. "« Nous sommes uniques » : facteurs de stress organisationnels, soutien par les pairs et attitudes à l’égard des soins de santé mentale chez les pompiers d’aéroport". Promotion de la santé et prévention des maladies chroniques au Canada 43, n.º 10/11 (noviembre de 2023): 503–14. http://dx.doi.org/10.24095/hpcdp.43.10/11.03f.
Texto completoKalajdzic, Jasminka. "Access to Justice for the Wrongfully Accused in National Security Investigations". Windsor Yearbook of Access to Justice 27, n.º 1 (1 de febrero de 2009): 172. http://dx.doi.org/10.22329/wyaj.v27i1.4567.
Texto completoTesis sobre el tema "Sécurité et confidentialité"
Cherif, Amina. "Sécurité des RFIDs actifs et applications". Thesis, Limoges, 2021. http://www.theses.fr/2021LIMO0015.
Texto completoOver the 30 last years, active RFID devices have evolved from nodes dedicated to identification to autonomous nodes that, in addition, sense (from environment or other sources) and exchange data. Consequently, the range of their applications has rapidly grown from identification only to monitoring and real time localisation. In recent years, thanks to their advantages, the use of active RFID nodes for mobile data collection has attracted significant attention. However, in most scenarios, these nodes are unattended in an adverse environments, so data must be securely stored and transmitted to prevent attack by active adversaries: even if the nodes are captured, data confidentiality must be ensured. Furthermore, due to the scarce resources available to nodes in terms of energy, storage and/or computation, the used security solution has to be lightweight. This thesis is divided in two parts. In the first, we will study in details the evolution of active RFID nodes and their security. We will then, present, in the second part, a new serverless protocol to enable MDCs (Mobile Data Collectors), such as drones, to collect data from mobile and static Active RFID nodes and then deliver them later to an authorized third party. The whole solution ensures data confidentiality at each step (from the sensing phase, before data collection by the MDC, once data have been collected by MDC, and during final delivery) while fulfilling the lightweight requirements for the resource-limited entities involved. To assess the suitability of the protocol against the performance requirements, we will implement it on the most resource-constrained secure devices to prove its efficiency even in the worst conditions. In addition, to prove the protocol fulfills the security requirements, we will analyze it using security games and we will also formally verify it using the AVISPA and ProVerif tools
Dubreil, Jérémy. "Vérification et Synthèse de Contrôleur pour des Propriétés de Confidentialité". Phd thesis, Université Rennes 1, 2009. http://tel.archives-ouvertes.fr/tel-00461306.
Texto completoMartinet, Gwenaëlle. "Contribution à une théorie de la sécurité des implémentations cryptographiques". Paris 7, 2004. http://www.theses.fr/2004PA077195.
Texto completoSomé, Dolière Francis. "Sécurité et vie privée dans les applications web". Thesis, Université Côte d'Azur (ComUE), 2018. http://www.theses.fr/2018AZUR4085/document.
Texto completoIn this thesis, we studied security and privacy threats in web applications and browser extensions. There are many attacks targeting the web of which XSS (Cross-Site Scripting) is one of the most notorious. Third party tracking is the ability of an attacker to benefit from its presence in many web applications in order to track the user has she browses the web, and build her browsing profile. Extensions are third party software that users install to extend their browser functionality and improve their browsing experience. Malicious or poorly programmed extensions can be exploited by attackers in web applications, in order to benefit from extensions privileged capabilities and access sensitive user information. Content Security Policy (CSP) is a security mechanism for mitigating the impact of content injection attacks in general and in particular XSS. The Same Origin Policy (SOP) is a security mechanism implemented by browsers to isolate web applications of different origins from one another. In a first work on CSP, we analyzed the interplay of CSP with SOP and demonstrated that the latter allows the former to be bypassed. Then we scrutinized the three CSP versions and found that a CSP is differently interpreted depending on the browser, the version of CSP it implements, and how compliant the implementation is with respect to the specification. To help developers deploy effective policies that encompass all these differences in CSP versions and browsers implementations, we proposed the deployment of dependency-free policies that effectively protect against attacks in all browsers. Finally, previous studies have identified many limitations of CSP. We reviewed the different solutions proposed in the wild, and showed that they do not fully mitigate the identified shortcomings of CSP. Therefore, we proposed to extend the CSP specification, and showed the feasibility of our proposals with an example of implementation. Regarding third party tracking, we introduced and implemented a tracking preserving architecture, that can be deployed by web developers willing to include third party content in their applications while preventing tracking. Intuitively, third party requests are automatically routed to a trusted middle party server which removes tracking information from the requests. Finally considering browser extensions, we first showed that the extensions that users install and the websites they are logged into, can serve to uniquely identify and track them. We then studied the communications between browser extensions and web applications and demonstrate that malicious or poorly programmed extensions can be exploited by web applications to benefit from extensions privileged capabilities. Also, we demonstrated that extensions can disable the Same Origin Policy by tampering with CORS headers. All this enables web applications to read sensitive user information. To mitigate these threats, we proposed countermeasures and a more fine-grained permissions system and review process for browser extensions. We believe that this can help browser vendors identify malicious extensions and warn users about the threats posed by extensions they install
Grall, Hervé. "Deux critères de sécurité pour l'exécution de code mobile". Phd thesis, Ecole des Ponts ParisTech, 2003. http://tel.archives-ouvertes.fr/tel-00007549.
Texto completoBègue, Guillaume. "Confidentialité et prévention de la criminalité financière : étude de droit comparé". Thesis, Paris 1, 2016. http://www.theses.fr/2016PA01D019.
Texto completoThe recent trend towards transaprency in business highlights a more global disenchantment with the concept of secrecy. The concept of secrecy benefits from various legal expressions whose origins give it as undisputable legitimacy. This observation leads us to recognise the existence of a "Principle of confidentiality". The clash betxeen the rules of Financial Crime prevention and this principle of confidentiality is causing legal uncertainty not only for professional subject to Anti-money laundering and counter-terrorism financing regulations but also gor persons whose data is being processed. These two sets of conflicting rules nevertheless share a common goal, namely to ensure respect for fundamental rights. Notwithstanding this, both the risk of abuse of legal instruments offered by one set for illegitimate purposes and the shortcomings attached to the other set potentially hinder the efficient and reasonable use of Law. This study aims at analysing antagonistic principles to reach a certain balance by applying solutions which preserve their respective interests and contribute to legal certainty. In this regard, the comparative law analysis helps better interpret customer due diligence measures whilst rehabilitating the arguments in favour of the principle of confidentiality. This shows the development of e genuine AML/CFT Law and in particular its preventive aspects that form a major part of the Banking and Financial Regulations
Delannoy, Xavier. "Contributions à l'étude de la tension entre cohérence et confidentialité et du classement d'objets selon leur histoire dans les bases de données". Phd thesis, Université Joseph Fourier (Grenoble), 1997. http://tel.archives-ouvertes.fr/tel-00004936.
Texto completoBadra, Mohamad. "Le transport et la sécurisation des échanges sur les réseaux sans fil". Phd thesis, Télécom ParisTech, 2004. http://pastel.archives-ouvertes.fr/pastel-00000952.
Texto completoKauffmann-Tourkestansky, Xavier. "Analyses sécuritaires de code de carte à puce sous attaques physiques simulées". Phd thesis, Université d'Orléans, 2012. http://tel.archives-ouvertes.fr/tel-00771273.
Texto completoBarquissau, Eric. "L’évaluation de la qualité de la relation client en ligne par les utilisateurs d’espaces clients de sites web : une application dans le secteur bancaire et dans le secteur de la téléphonie mobile". Thesis, Paris 10, 2013. http://www.theses.fr/2013PA100205.
Texto completoThe Internet has dramatically changed the way companies interact with their customers. Because of the importance of e-customer relationship management, companies have to reconsider their strategies in terms of relationship marketing. The purpose of this research is to investigate the way users of personal websites’ accounts evaluate e-relationship quality within two sectors: the banking sector and the mobile phone sector. This research deals with an important concept: appropriation.A qualitative study has been conducted in order to build a research model and to create a measurement scale to study the appropriation of a personal websites’ account. Therefore, an online survey (N=534) was conducted to test the hypothesis. The findings suggest that the appropriation of a personal websites’ account is a mediating variable between perceived ease of use, perceived usability and relationship quality, both in the banking sector and in the mobile phone sector. In the same way, privacy has a positive influence on e-relationship quality. Moreover, perceived interactivity has a positive influence on e-relationship quality, but that particular hypothesis is partially validated. Finally, social presence does not have a positive influence on e-relationship quality
Capítulos de libros sobre el tema "Sécurité et confidentialité"
SEMMOUD, Abderrazaq y Badr BENMAMMAR. "La sécurité intelligente des réseaux informatiques". En Gestion et contrôle intelligents des réseaux, 5–28. ISTE Group, 2020. http://dx.doi.org/10.51926/iste.9008.ch1.
Texto completoZXIVANOVICH, Sava, Branislav TODOROVIC, Jean-Pierre LORRÉ, Darko TRIFUNOVIC, Adrian KOTELBA, Ramin SADRE y Axel LEGAY. "L’IdO pour une nouvelle ère de réseaux unifiés, de confiance zéro et de protection accrue de la vie privée". En Cybersécurité des maisons intelligentes, 185–213. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch5.
Texto completoATTRAPADUNG, Nuttapong y Takahiro MATSUDA. "Chiffrement à clé publique et notions de sécurité". En Cryptographie asymétrique, 5–53. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9096.ch1.
Texto completoHAMDI, Omessaad, Mohamed AYMEN CHALOUF y Amal SAMMOUD. "Utilisation de la biométrie pour sécuriser les communications intra-BAN". En Gestion de la sécurité en e-santé, 137–59. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9179.ch6.
Texto completoBERGERON, Cyril, Wassim HAMIDOUCHE y Olivier DÉFORGES. "Crypto-compression de vidéos". En Sécurité multimédia 2, 145–89. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9027.ch5.
Texto completoITIER, Vincent, Pauline PUTEAUX y William PUECH. "Crypto-compression d’images". En Sécurité multimédia 2, 105–44. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9027.ch4.
Texto completoSCHMITT, Corinna y Marvin WEBER. "Solution domotique pour SecureWSN". En Cybersécurité des maisons intelligentes, 1–79. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch1.
Texto completoActas de conferencias sobre el tema "Sécurité et confidentialité"
Boulanger, J.-L. y L. Zhao. "Sécurité, confidentialité et intégrité dans les systèmes ferroviaires". En Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56197.
Texto completoRodríguez González, Sylvia Cristina. "Megadesarrollos turísticos de sol y playa enclaves del imaginario". En International Conference Virtual City and Territory. Barcelona: Centre de Política de Sòl i Valoracions, 2009. http://dx.doi.org/10.5821/ctv.7522.
Texto completoInformes sobre el tema "Sécurité et confidentialité"
Dufour, Quentin, David Pontille y Didier Torny. Contracter à l’heure de la publication en accès ouvert. Une analyse systématique des accords transformants. Ministère de l'enseignement supérieur et de la recherche, abril de 2021. http://dx.doi.org/10.52949/2.
Texto completo