Literatura académica sobre el tema "Sécurité Internet"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Sécurité Internet".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Sécurité Internet"
Falque-Pierrotin, Isabelle. "Internet, sécurité et libertés". Annales des Mines - Réalités industrielles Mai 2009, n.º 2 (2009): 77. http://dx.doi.org/10.3917/rindu.092.0077.
Texto completoNorodom, Anne-Thida. "La galaxie Internet". Questions internationales 91-92, n.º 3 (27 de junio de 2018): 59–70. http://dx.doi.org/10.3917/quin.091.0059.
Texto completo-CHICHE, Thierry. "La sécurité internet appliquée aux systèmes de production". Revue de l'Electricité et de l'Electronique -, n.º 06 (2001): 75. http://dx.doi.org/10.3845/ree.2001.069.
Texto completoMeiller, Yannick. "La sécurité de l’information devrait être plus présente dans les programmes des écoles de management". Sécurité et stratégie 32, n.º 4 (19 de marzo de 2024): 12–16. http://dx.doi.org/10.3917/sestr.032.0012.
Texto completoTschumi Canosa, Xavier y Thania Paffenholz. "Coopération internationale entre paix et sécurité : portes d’entrée sur Internet". Annuaire suisse de politique de développement, n.º 25-2 (1 de octubre de 2006): 229–31. http://dx.doi.org/10.4000/aspd.282.
Texto completoTschudi, Hunziker, Kündig, Lüscher, Freiermuth, Heller y Heberer. "Internet-Kommunikation zwischen Hausärzten und Universitätsspital". Praxis 91, n.º 7 (1 de febrero de 2002): 257–60. http://dx.doi.org/10.1024/0369-8394.91.7.257.
Texto completoBernie Baeaufort. "Vote en ligne pour les initiatives de terrain en Californie : Collecte de signatures électroniques". International Journal of Science and Society 4, n.º 4 (18 de octubre de 2022): 75–83. http://dx.doi.org/10.54783/ijsoc.v4i4.555.
Texto completoOuimet, Marc. "Réflexions sur Internet et les tendances de la criminalité". Criminologie 39, n.º 1 (26 de junio de 2006): 7–21. http://dx.doi.org/10.7202/013123ar.
Texto completoBryce, George K. y Pran Manga. "The Effectiveness of Health and Safety Committees". Articles 40, n.º 2 (12 de abril de 2005): 257–83. http://dx.doi.org/10.7202/050133ar.
Texto completoVallet, Caroline. "La cyberpédopornographie : au centre des débats". Chronique de législation 40, n.º 2 (17 de octubre de 2014): 599–615. http://dx.doi.org/10.7202/1026961ar.
Texto completoTesis sobre el tema "Sécurité Internet"
Jacquin, Ludovic. "Compromis performance/sécurité des passerelles très haut débit pour Internet". Phd thesis, Université de Grenoble, 2013. http://tel.archives-ouvertes.fr/tel-00911075.
Texto completoAissaoui, Mehrez Hassane. "Sécurité pour les réseaux du futur : gestion sécurisée des identités". Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066606.
Texto completoToday, the Internet is changing radically our habits, especially with the massive influx of the nomadic techniques, the Internet of objects, the growing use of grid computing, wireless networks and the emergence of new approaches in recent years. In particular, the virtualization of the computing infrastructures, which allowed defining a new model called Cloud Computing, introducing an enough frank breakdown with the traditional models, can be perceived as a preparatory stage towards the Internet of future.The implementation of these approaches allows, in a different way : mutualization and organization of the computer system. It allows to dematerialize the physical infrastructures and to deport applications on distant containers. Therefore, the global architecture of Internet should be evolved. It will rely strongly on these new approaches and in particular, Cloud Computing and virtualization. However, no system is infallible especially if resources are distributed and mutualized. They raise a number of problems and involve directly security issues, which remain one of the main barriers to the adoption of these technologies.Like any new technology, Cloud Computing and virtualization create new risks, which come to graft to traditional threats of the outsourcing management of the privilege separation, the identity and accesses management, the robustness of the virtualization software, the virtual machine isolation, the personal data protection, reversibility, privacy... The traditional Internet architecture cannot provide the adequate solutions to the challenges raised by these new approaches: mobility, flexibility, security requirements, reliability and robustness. Thus, a research project (SecFuNet : Security For Future Networks) was validated by the European Commission, to provide some answers, to make a state of the art of these security mechanisms and a comprehensive study of orchestration and integration techniques based on protection components within overall security architecture
Aissaoui, Mehrez Hassane. "Sécurité pour les réseaux du futur : gestion sécurisée des identités". Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066606.
Texto completoToday, the Internet is changing radically our habits, especially with the massive influx of the nomadic techniques, the Internet of objects, the growing use of grid computing, wireless networks and the emergence of new approaches in recent years. In particular, the virtualization of the computing infrastructures, which allowed defining a new model called Cloud Computing, introducing an enough frank breakdown with the traditional models, can be perceived as a preparatory stage towards the Internet of future.The implementation of these approaches allows, in a different way : mutualization and organization of the computer system. It allows to dematerialize the physical infrastructures and to deport applications on distant containers. Therefore, the global architecture of Internet should be evolved. It will rely strongly on these new approaches and in particular, Cloud Computing and virtualization. However, no system is infallible especially if resources are distributed and mutualized. They raise a number of problems and involve directly security issues, which remain one of the main barriers to the adoption of these technologies.Like any new technology, Cloud Computing and virtualization create new risks, which come to graft to traditional threats of the outsourcing management of the privilege separation, the identity and accesses management, the robustness of the virtualization software, the virtual machine isolation, the personal data protection, reversibility, privacy... The traditional Internet architecture cannot provide the adequate solutions to the challenges raised by these new approaches: mobility, flexibility, security requirements, reliability and robustness. Thus, a research project (SecFuNet : Security For Future Networks) was validated by the European Commission, to provide some answers, to make a state of the art of these security mechanisms and a comprehensive study of orchestration and integration techniques based on protection components within overall security architecture
Mouelhi, Tejeddine. "Modélisation et test de mécanismes de sécurité dans des applications internet". Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-00544431.
Texto completoClaeys, Timothy. "Sécurité pour l'internet des objets : une approche des bas en haut pour un internet des objets sécurisé et normalisé". Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAM062.
Texto completoThe rapid expansion of the IoT has unleashed a tidal wave of cheap Internet-connected hardware. Formany of these products, security was merely an afterthought. Due to their advanced sensing and actuatingfunctionalities, poorly-secured IoT devices endanger the privacy and safety of their users.While the IoT contains hardware with varying capabilities, in this work, we primarily focus on the constrainedIoT. The restrictions on energy, computational power, and memory limit not only the processingcapabilities of the devices but also their capacity to protect their data and users from attacks. To secure theIoT, we need several building blocks. We structure them in a bottom-up fashion where each block providessecurity services to the next one.The first cornerstone of the secure IoT relies on hardware-enforced mechanisms. Various security features,such as secure boot, remote attestation, and over-the-air updates, rely heavily on its support. Sincehardware security is often expensive and cannot be applied to legacy systems, we alternatively discusssoftware-only attestation. It provides a trust anchor to remote systems that lack hardware support. In thesetting of remote attestation, device identification is paramount. Hence, we dedicated a part of this work tothe study of physical device identifiers and their reliability.The IoT hardware also frequently provides support for the second building block: cryptography. Itis used abundantly by all the other security mechanisms, and recently much research has focussed onlightweight cryptographic algorithms. We studied the performance of the recent lightweight cryptographicalgorithms on constrained hardware.A third core element for the security of the IoT is the capacity of its networking stack to protect the communications.We demonstrate that several optimization techniques expose vulnerabilities. For example,we show how to set up a covert channel by exploiting the tolerance of the Bluetooth LE protocol towardsthe naturally occurring clock drift. It is also possible to mount a denial-of-service attack that leverages theexpensive network join phase. As a defense, we designed an algorithm that almost completely alleviates theoverhead of network joining.The last building block we consider is security architectures for the IoT. They guide the secure integrationof the IoT with the traditional Internet. We studied the IETF proposal concerning the constrainedauthentication and authorization framework, and we propose two adaptations that aim to improve its security.Finally, the deployment of the IETF architecture heavily depends on the security of the underlying communicationprotocols. In the future, the IoT will mainly use the object security paradigm to secure datain flight. However, until these protocols are widely supported, many IoT products will rely on traditionalsecurity protocols, i.e., TLS and DTLS. For this reason, we conducted a performance study of the most criticalpart of the protocols: the handshake phase. We conclude that while the DTLS handshake uses fewerpackets to establish the shared secret, TLS outperforms DTLS in lossy networks
Saleh, Hayder. "Une architecture novatrice de sécurité à base de carte à puce Internet". Versailles-St Quentin en Yvelines, 2002. http://www.theses.fr/2002VERSA009.
Texto completoBachy, Yann. "Sécurité des équipements grand public connectés à Internet : évaluation des liens de communication". Thesis, Toulouse, INSA, 2015. http://www.theses.fr/2015ISAT0014/document.
Texto completoToday, equipment embedding software and an Internet connection are more and more numerous and various. With the emergence of “the internet of things” and the trend to interconnect everything, many equipment used in our every day life are now connected to the internet: Smart-Tvs, DVD players, alarm and home automation systems, and even health assistance home devices, for example. Unfortunately, these technological evolutions also introduce new security threats. The massive use of internet facilitates the propagation of malware, capable of targeting any computer device, and more specifically any internet connected device. Although several methods allowing security analysis of industrial systems exist, their application to home devices is still limited. The existence and the criticality of potential vulnerabilities in these devices are not well-known, because they have not been thoroughly studied. This is precisely the objective of this thesis, which presents a method allowing to carry out a vulnerability analysis of internet connected home devices. This method is composed of two main phases: a risk analysis phasefollowed by an experimental phase. The security analysis of any type of equipement, requires a good knowledge ofits environment. In order to guide the evaluator in this task, we propose, as a first step, to rely on existing risk analysis methods. These methods are now mature, and allow the evaluator to obtain a global view of the risks incurred by the usage of anequipment. Then, during the second step of our method, the evaluator concentrates on the most important risks in order to demonstrate the technical feasibility of the scenarios leading to the considered risks, by carrying out several experiments.Considering the large amount and the diversity of I/Os on connected devices, it is important to focus on specifically rich attack scenarios, possibly depending on a simple local vulnerability. For this second step, an experimental method is proposedin order to study these attack scenarios, which, moreover, target equipement whose specifications are not necessarily available.In order to illustrate the entire method, this thesis presents two case studies: Integrated Access Devices and Smart-Tvs. These studies are carried out on a panel of devices from major internet service providers and TV manufacturers, allowing us to compare several devices available on the market. The vulnerabilities pointed out, mainly concern the communication means (local loop for the IAD, DVB-T interface for the smart-TVs) connecting these devices to their service providers (ISP for the IAD, TV and VoD for the smart-TVs). These communication links are usually considered safe, and have been, to our knowledge, seldom explored. Thisthesis thereby contributes to the security analysis of these particular communication means for connected devices and points out some original attack paths. Finally, this thesis ends by presenting different existing security mechanisms that can be used to avoid exploitation of the identified weaknesses
Vu, Van-Hoan. "Infrastructure de gestion de la confiance sur internet". Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2010. http://tel.archives-ouvertes.fr/tel-00611839.
Texto completoGuillet, Thomas. "Sécurité de la téléphonie sur IP". Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00559130.
Texto completoGuillet, Thomas. "Sécurité de la téléphonie sur IP". Phd thesis, Paris, Télécom ParisTech, 2010. https://pastel.hal.science/pastel-00559130.
Texto completoThis work focuses on the security of telephony networks deployed in the Internet. Without any doubt after the Web and messaging application, this service will impose IP (Internet Protocol) infrastructures like the standard for all types of information or media. Initially, we look for opportunities to strengthen the security of SIP (Session Initiation Protocol) IETF protocol currently massively adopted in the telephony infrastructure. We propose and validate innovative solutions to strengthen existing mechanisms in a completely transparent way for infrastructures. We choose to focus on authentication, because it is the first mechanism encountered by users or systems. The solutions presented below propose new security properties by defining a semantic field called "opaque". In a second step, we are interested in security solutions for end-to-end calls. Analysis of application solutions as “Future Narrow Band Digital Terminal” and “Simple Secure Voice over IP protocol“ allows us to formalize the specification of an architecture to protect conversations whatever the specificities and heterogeneity of networks ToIP are. Finally, the conclusion takes over and takes positions on the various contributions to this work in the context of IP telephony. Our will to be interoperable with the underlying or independent infrastructure can be considered as a value added service
Libros sobre el tema "Sécurité Internet"
Ghernaouti-Hélie, Solange. Internet et sécurité. Paris: Presses universitaires de France, 2002.
Buscar texto completoPiette-Coudol, Thierry. Les objets connectés: Sécurité juridique et technique. Paris: Lexis Nexis, 2015.
Buscar texto completoSimon, Cooper y Chapman D. Brent, eds. Building Internet Firewalls: Internet and Web security. 2a ed. Beijing: O'Reilly, 2000.
Buscar texto completoBloch, Laurent. Sécurité informatique: Principes et méthode. Paris: Eyrolles, 2007.
Buscar texto completoChapman, D. Brent. Building Internet firewalls. Cambridge, MA: O'Reilly & Associates, 1995.
Buscar texto completoD, Zwicky Elizabeth, ed. Building Internet Firewalls. Sebastopol, CA: O'Reilly & Associates, 1995.
Buscar texto completoOppliger, Rolf. Internet and Intranet security. Boston: Artech House, 1998.
Buscar texto completoInternet and Intranet security. 2a ed. Boston, MA: Artech House, 2002.
Buscar texto completo1974-, Lacour Stéphanie, Asphalès (Research program) y Centre national de la recherche scientifique (France), eds. La sécurité aujourd'hui dans la société de l'information. Paris: Harmattan, 2007.
Buscar texto completo1974-, Lacour Stéphanie, Asphalès (Research program) y Centre national de la recherche scientifique (France), eds. La sécurité aujourd'hui dans la société de l'information. Paris: Harmattan, 2007.
Buscar texto completoCapítulos de libros sobre el tema "Sécurité Internet"
KHALIL, Ahmad, Nader MBAREK y Olivier TOGNI. "Adaptation du contrôle d’accès pour la sécurité de l’IoT". En La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 169–204. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch7.
Texto completoAL AGHA, Khaldoun, Pauline LOYGUE y Guy PUJOLLE. "Internet des Edges : la virtualisation". En Edge Networking, 157–78. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9068.ch8.
Texto completoAL AGHA, Khaldoun, Pauline LOYGUE y Guy PUJOLLE. "Le déploiement de l’Internet participatif". En Edge Networking, 221–39. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9068.ch11.
Texto completoWalczack, Cathy y Serge Keroullé. "9 Le MASE : Manuel Amélioration Sécurité Entreprises". En La sous-traitance interne, 241–56. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7-011.
Texto completoWalczack, Cathy y Serge Keroullé. "9 Le MASE : Manuel Amélioration Sécurité Entreprises". En La sous-traitance interne, 241–56. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7.c011.
Texto completoMoinet, Nicolas y Guilhem Armanet. "Outil 28. La communication interne". En La boîte à outils de la sécurité économique, 92–93. Dunod, 2015. http://dx.doi.org/10.3917/dunod.moine.2015.01.0092.
Texto completoAgut, Gérard y Alain Colman. "14 La politique hygiène et sécurité d’une PME de mécanique industrielle". En La sous-traitance interne, 296–303. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7-016.
Texto completoAgut, Gérard y Alain Colman. "14 La politique hygiène et sécurité d’une PME de mécanique industrielle". En La sous-traitance interne, 296–303. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7.c016.
Texto completoDuchêne, François. "12 Formations externes à la sécurité pour les établissements classés Seveso, un dispositif sous pression1". En La sous-traitance interne, 272–86. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7-014.
Texto completoDuchêne, François. "12 Formations externes à la sécurité pour les établissements classés Seveso, un dispositif sous pression1". En La sous-traitance interne, 272–86. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7.c014.
Texto completoActas de conferencias sobre el tema "Sécurité Internet"
Rodríguez González, Sylvia Cristina. "Megadesarrollos turísticos de sol y playa enclaves del imaginario". En International Conference Virtual City and Territory. Barcelona: Centre de Política de Sòl i Valoracions, 2009. http://dx.doi.org/10.5821/ctv.7522.
Texto completoInformes sobre el tema "Sécurité Internet"
Marsden, Eric. Partage des modèles de sécurité entre donneurs d’ordres et entreprises intervenantes. Fondation pour une culture de sécurité industrielle, diciembre de 2018. http://dx.doi.org/10.57071/360upb.
Texto completoGautrais, Vincent y Nicolas Aubin. Modèle d'évaluation des facteurs relatifs à la circulation des données: Instrument de protection de la vie privée et des droits et libertés dans le développement et l’usage de l’intelligence artificielle. Observatoire international sur les impacts sociétaux de l'IA et du numérique, marzo de 2022. http://dx.doi.org/10.61737/rrlb1735.
Texto completoFlandin, Simon, Germain Poizat y Romuald Perinet. Proactivité et réactivité: deux orientations pour concevoir des dispositifs visant le développement de la sécurité industrielle par la formation. Fondation pour une culture de sécurité industrielle, febrero de 2021. http://dx.doi.org/10.57071/948rpn.
Texto completoMbaye, Safiétou, Rémi Kouabenan y Philippe Sarnin. L'explication naïve et la perception des risques comme des voies pour améliorer les pratiques de REX: des études dans l'industrie chimique et l'industrie nucléaire. Fondation pour une culture de sécurité industrielle, septiembre de 2009. http://dx.doi.org/10.57071/311rex.
Texto completoFICHE D’INFORMATION : D’auto-défenseurs à justiciers : un cadre typologique pour les groupes armés communautaires. RESOLVE Network, diciembre de 2020. http://dx.doi.org/10.37805/fs2020.6.cbags.fr.
Texto completo