Literatura académica sobre el tema "Sécurité formelle"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Sécurité formelle".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Sécurité formelle"
Kostic, Cvetko. "Les rapports industriels en Yougoslavie". Relations industrielles 25, n.º 2 (12 de abril de 2005): 226–36. http://dx.doi.org/10.7202/028125ar.
Texto completoBoureille, Patrick. "Les relations navales franco-roumaines (1919-1928) : les illusions perdues". Revue Historique des Armées 244, n.º 3 (1 de agosto de 2006): 50–59. http://dx.doi.org/10.3917/rha.244.0050.
Texto completoLedru, Yves, Régine Laleau y Sylvie Vignes. "Une tentative d'utilisation conjointe d'UML et d'une méthode formelle pour la modélisation de la sécurité des aéroports". Ingénierie des systèmes d'information 13, n.º 4 (31 de agosto de 2008): 133–57. http://dx.doi.org/10.3166/isi.13.4.133-157.
Texto completoRösler, Hannes. "Protection of the Weaker Party in European Contract Law: Standardized and Individual Inferiority in Multi-level Private Law". European Review of Private Law 18, Issue 4 (1 de agosto de 2010): 729–56. http://dx.doi.org/10.54648/erpl2010059.
Texto completoHoechner, Hannah y Sadisu Idris Salisu. "Toujours les Mêmes Boucs Émissaires ? La Lutte contre la Pandémie et la Sécuritisation de l'Éducation Coranique dans le Nord du Nigéria". Journal on Education in Emergencies 8, n.º 3 (2022): 111. http://dx.doi.org/10.33682/6zws-v6j9.
Texto completoAruwayo, A., S. S. Adeola y U. Ibrahim. "Assessment of the challenges of nomadic farming activities in Daura agricultural zone of Katsina State, Nigeria". Nigerian Journal of Animal Production 48, n.º 2 (2 de marzo de 2021): 200–209. http://dx.doi.org/10.51791/njap.v48i2.2930.
Texto completoKanter, Arlene S. "A Comparative View of Equality Under the UN Convention on the Rights of PERSONS with Disabilities and the Disability Laws of the United States and Canada". Windsor Yearbook of Access to Justice 32, n.º 2 (1 de octubre de 2015): 65. http://dx.doi.org/10.22329/wyaj.v32i2.4682.
Texto completoMulone1, Massimiliano y Samuel Tanner. "Les acteurs privés de la sécurité transnationale et leurs victimes". Criminologie 47, n.º 2 (30 de septiembre de 2014): 203–29. http://dx.doi.org/10.7202/1026734ar.
Texto completoGrace, D., T. F. Randolph, Alphonse Omoré, E. Schelling y Bassirou Bonfoh. "Place de la sécurité sanitaire des aliments dans l’évolution de la politique laitière en faveur des pauvres en Afrique de l’Est et de l’Ouest". Revue d’élevage et de médecine vétérinaire des pays tropicaux 60, n.º 1-4 (1 de enero de 2007): 153. http://dx.doi.org/10.19182/remvt.9967.
Texto completoNdao, Alassane. "L’informalisation de la violence physique légitime : le Sénégal à l’épreuve des milices islamiques". Lien social et Politiques, n.º 76 (18 de julio de 2016): 96–113. http://dx.doi.org/10.7202/1037067ar.
Texto completoTesis sobre el tema "Sécurité formelle"
Obeid, Fadi. "Validation formelle d'implantation de patrons de sécurité". Thesis, Brest, École nationale supérieure de techniques avancées Bretagne, 2018. http://www.theses.fr/2018ENTA0002/document.
Texto completoSoftware-based architectures pose challenges for security experts. Many studieshave aimed to develop theoretical solutions, methodological guides and recommendations to enhance security and protect these systems.One solution proposed is to integrate security patterns as methodological solutions to adapt to the specificities of the considered architectures. Such a solution is considered reliable if it solves a security problem without affecting systemrequirements. Once an architecture model implements the security patterns, it is necessary to formally validate this new model against the expected requirements. Model checking techniques allow this validation by verifying, on one hand, that theproperties of the security patterns are respected and, on the other hand, that the properties of the initial model are preserved.In this thesis work, we study the methods and concepts to generate architectural models that meet specific security requirements. Starting with a software architecture model, a security policy and a library of security patterns, we want to generate a secure architecture. Each security pattern is described by aformal description of its structure and behavior, as well as a formal description of the security properties associated with that pattern.This thesis reports work on the technical exploitation of formal verification of properties, using model-checking.The idea is to be able to generate an architecture model that implements security patterns, and to verify that the security properties, as well as the model requirements, are respected in the resulting architecture.In perspective, the results of our work could be applied to define a methodology for a better validation of the security of industrial systems like SCADA
Mallouli, Wissam. "Une approche formelle pour le test des politiques de sécurité". Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0021.
Texto completoSecurity is a critical issue especially in dynamic and open distributed environments such as World Wide Web or wireless networks. To ensure that a certain level of security is always maintained, the system behavior must be restrained by a security policy. In this thesis, we propose a framework to specify security policies and test their implementation on networking and information systems. Security policies, nowadays, are a key point for the success of every modern infrastructure. The specification and the testing of security policies are the fundamental steps in the development of a secure system since any error in a set of rules is likely to harm the global security. We rely on two different test approaches to build our framework: the active and the passive approaches. The active testing consists in generating a set of test cases that can be applied on a specific implementation to study its conformance according to its security requirements. Whereas, the passive testing consists in passively observing the traffic of the system under test, without interrupting its normal operations. In the active approach, we propose a framework to automatically generate test sequences to validate the conformance of a security policy. The functional behavior of the system is specified using a formal description technique based on Extended Finite State Machines (EFSM), while the security requirement is specified using two formals languages (Or-BAC and Nomad). We developed specific algorithms to integrate the security rules within the functional system specification. In this way, we obtain a complete specification of the secured system. Then, the automatic test generation is performed using dedicated tools to produce test suites in a standard language (TTCN or MSC) facilitating their portability. In the passive testing approach, we specify, using Nomad formal language, the security policy the system under test has to respect. We analyze then the collected traces of the system execution in order to deduce verdicts of their conformity with respect to the system security requirements. Several algorithms are developed to check whether the collected traces conform or not to the security policy. We applied our framework on diverse systems ranging from wireless networking (OLSR ad hoc routing protocol) to computer systems including audit systems (SAP R/3), web services (France Télécom Travel) and web applications (Weblog Application). This wide range of applications allows to demonstrate the efficiency and the reliability of the proposed approaches
Fall, Marfall N'Diaga. "Sécurisation formelle et optimisée de réseaux informatiques". Thesis, Université Laval, 2010. http://www.theses.ulaval.ca/2010/27543/27543.pdf.
Texto completoFirewalls are crucial elements in enforcing network security policies. They have been widely deployed for securing private networks but, their configuration remains complex and error prone. During the last years, many techniques and tools have been proposed to correctly configure firewalls. However, most of existing works are informal and do not take into account the global performance of the network or other qualities of its services (QoS). In this thesis we introduce a formal approach allowing to formally and optimally configure a network so that a given security policy is respected and by taking into account the QoS.
Mili, Saoussen. "Approche de vérification formelle des exigences de sécurité pour les systèmesembarqués communicants". Thesis, CY Cergy Paris Université, 2020. http://www.theses.fr/2020CYUN1062.
Texto completoDue to their most often complex nature, the control of the security in commu-nicating embedded systems comes up against major difficulties. The adoption of amodel-based approach for verifying system requirements at the earliest stage, i.e. in the design phase, may bring about substantial cost cutting and time saving. In this doctoral thesis, we propose a design-centric approach for the formal verification of an attack scenario satisfiability for embedded communicating systems. Thus, we propose a three-stage approach : i) conceptual modelling of the system, ii) conceptual modelling of the attack, iii) transformation of conceptual models into formal models for verification. For the structural and behavioural modelling of the system, we opted for the SysML language as it offers the best adaptability and extensibility by profiling. In order to personalize the modelling of data flows, we stereotyped ports and connectors according to their technologies and properties. This extension allowed us to monitor the circulation traces of flows between the differentcommunicating subsystems. A documentation of the connectivity profile was pro-posed. For structuring the attack, we put forward an extended attack tree profile termed ExtAttTree. Unlike conventional attack trees, this profile manages to ensure both formal and temporal aspects of the attack, through the insertion of operators of temporal logic in its nodes.We introduce, in the third part, a study of models’ transformation, carried outwithin this predefined framework. The transformation proceeded in a substantially optimized way, based on the Model-Driven Architecture paradigm. We implemented two transformation processes. The first aimed to generate NuSMV code from SysML models by using a transformation by template paradigm with Acceleo. The second ensures the transition from the ExtAttTree attack to the Computational Tree Logic formula using a programming language transformation paradigm with Java. The generated models are simulated on the NuSMV model checker. The system is characterized by attributes ; to achieve satisfiability tests, a variation in the attributes truth-value is carried out. This scheme allows to accurately detect the conditions that led to an attack. As a complement to this approach, we proposed two case studies of connected cars remote attacks (the Jeep Cherokee and the Tesla Model S). The attack scenarios inspired from real-life are analyzed in order to validate the approach
El, Khoury Hicham. "Une modélisation formelle orientée flux de données pour l'analyse de configuration de sécurité réseau". Toulouse 3, 2014. http://thesesups.ups-tlse.fr/2499/.
Texto completoThe implementation of network security policy requires the configuration of heterogeneous and complex security mechanisms in a given network environment (IPsec gateways, ACLs on routers, stateful firewalls, proxies, etc. ). The complexity of this task resides in the number, the nature, and the interdependence of these mechanisms. Although several researchers have proposed different analysis tools, achieving this task still requires experienced and proficient security administrators who can handle all these parameters. In this thesis, we propose a solution to facilitate the work of network administrators. Indeed, many inconsistencies come from the incompatibility of policy rules and/or incompatible mechanisms implemented in devices through which packets travel. A generic formal theory that allows reasoning about network data flows and security mechanisms is missing. With this end in mind, we develop in this thesis three results: •A formal data-flow oriented model to analyze and detect network security conflicts between different mechanisms playing a role at various ISO levels. We modeled a flow of information by a triplet containing the list of communication protocols (i. E. , encapsulation), the list of authenticated attributes and the list of encrypted attributes, •A generic attribute-based model for network security mechanisms representation and configuration. We have formally specified the capacity and configuration of security mechanisms by constructing an abstraction of physical flows of data blocks. We have proposed a solution that can satisfy security requirements and can help conflicts analysis in the deployment of technologies installed on different devices, •To evaluate both the ability of expression and analysis power of the modeling language. We have used CPN Tools [Jensen et Kristensen 2009] and [CPN tools] to formally specify our language. The goal of our research is to propose a modeling language for describing and validating architectural solutions that meet network security requirements. Simulations are applied to specific scenarios, such as the IPsec, NA(P)T and Netfilter/iptables protocols, to validate our approach. Nevertheless, the analysis of security conflicts is currently done by simulation and in a non-exhaustive manner. Our future work will aim to assist/automate the analysis by allowing the definition of properties in temporal logic for instance which will be automatically controlled
Rossi, Olivier Jacques Paul. "Validation formelle de programmes Ladder Diagram pour automates programmables industriels". Cachan, Ecole normale supérieure, 2003. http://www.theses.fr/2003DENS0012.
Texto completoDefossez, François. "Modélisation discrète et formelle des exigences temporelles pour la validation et l'évaluation de la sécurité ferroviaire". Phd thesis, Ecole Centrale de Lille, 2010. http://tel.archives-ouvertes.fr/tel-00584005.
Texto completoDefossez, François. "Modélisation discrète et formelle des exigences temporelles pour la validation et l’évaluation de la sécurité ferroviaire". Thesis, Ecole centrale de Lille, 2010. http://www.theses.fr/2010ECLI0004/document.
Texto completoThe introduction of new European standards for railway safety, coupled with an increasing use of software technology changes the method of development of critical railway systems. Indeed, new systems have to be at least as good as the previous ones. Therefore the appropriate safety level of critical systems has to be proved in order to obtain the necessary approval from the authorities. Accordingly a high level of reliability and correctness must be reached by the use of mathematical proofs and then formal methods. We focus on the treatment of the temporal requirements in the level crossing case study which is modelled with p-time Petri nets, and on the translation of this model in a more formal way by using the B method. This paper introduces a methodology to analyse the safety of timed discrete event systems. First, our goal is to take out the forbidden state highlighted by a p-time Petri net modelling. This model deals with the requirements of the considered system and has to contain all the constraints that have to be respected. Then we aim at describing a process identified as a solution of the system functioning. This method consists in exploring all the possible behaviours of the system by means of the construction of state classes. Finally, we check if the proposed process corresponds to the requirements model previously built.Our case-study is the level crossing, a critical component for the safety of railway systems
Jaeger, Eric. "Etude de l'apport des méthodes formelles déductives pour les développements de sécurité". Phd thesis, Université Pierre et Marie Curie - Paris VI, 2010. http://tel.archives-ouvertes.fr/tel-00468914.
Texto completoFilipiak, Alicia. "Conception et analyse formelle de protocoles de sécurité, une application au vote électronique et au paiement mobile". Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0039/document.
Texto completoThe last decade has seen the massive democratization of smart devices such as phones, tablets, even watches. In the wealthiest societies of the world, not only do people have their personal computer at home, they now carry one in their pocket or around their wrist on a day to day basis. And those devices are no more used simply for communication through messaging or phone calls, they are now used to store personal photos or critical payment data, manage contacts and finances, connect to an e-mail box or a merchant website... Recent examples call for more complex tasks we ask to such devices: Estonia voting policy allows the use of smart ID cards and smartphones to participate to national elections. In 2017, Transport for London launched the TfL Oyster app to allow tube users to top up and manage their Oyster card from their smartphone. As services grow with more complexity, so do the trust users and businesses put in them. We focus our interest into cryptographic protocols which define the exchanges between devices and entities so that such interaction ensure some security guarantees such as authentication, integrity of messages, secrecy… Their design is known to be an error prone task. Thankfully, years of research gave us some tools to improve the design of security protocols, among them are the formal methods: we can model a cryptographic protocol as an abstract process that manipulates data and cryptographic function, also modeled as abstract terms and functions. The protocol is tested against an active adversary and the guarantees we would like a protocol to satisfy are modeled as security properties. The security of the protocol can then be mathematically proven. Such proofs can be automated with tools like ProVerif or Tamarin. One of the big challenge when it comes to designing and formally proving the security an “industrial- level” protocol lies in the fact that such protocols are usually heavier than academic protocols and that they aim at more complex security properties than the classical ones. With this thesis, we wanted to focus on two use cases: electronic voting and mobile payment. We designed two protocols, one for each respective use case and proved their security using automated prover tools. The first one, Belenios VS, is a variant of an existing voting scheme, Belenios RF. It specifies a voting ecosystem allowing a user to cast a ballot from a voting sheet by flashing a code. The protocol’s security has been proven using the ProVerif tool. It guarantees that the vote confidentiality cannot be broken and that the user is capable of verifying their vote is part of the final result by performing a simple task that requires no technical skills all of this even if the user’s device is compromised – by a malware for instance. The second protocol is a payment one that has been conceived in order to be fully scalable with the existing payment ecosystem while improving the security management and cost on the smartphone. Its security has been proven using the Tamarin prover and holds even if the user’s device is under an attacker’s control
Capítulos de libros sobre el tema "Sécurité formelle"
Cru, Damien. "Les savoir-faire de prudence : un enjeu pour la prévention. Consignes formelles et pratiques informelles de sécurité". En Les risques du travail, 423–26. La Découverte, 2015. http://dx.doi.org/10.3917/dec.theba.2015.01.0423.
Texto completoInformes sobre el tema "Sécurité formelle"
Bibiane Ndjebet, Cécile y Phil René Oyono. Bassin du Congo : La sécurisation des droits fonciers des femmes lue à travers la théorie des droits de propriété. Rights and Resources Initiative, diciembre de 2020. http://dx.doi.org/10.53892/qaxg4403.
Texto completo