Literatura académica sobre el tema "Stockage sécurisé"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Stockage sécurisé".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Stockage sécurisé"
IRENGE MUFUNGIZI, Augustin y Marcolline MBOLIBILANI ANIHILI. "Développement d’un site web d’archivage numérique des travaux de recherche dans les institutions d’enseignement supérieur et universitaire de la ville d’Isiro". Revue du Centre de Recherche Interdisciplinaire de l'Université Pédagogique Nationale 96, n.º 4 (1 de mayo de 2021): 37–50. http://dx.doi.org/10.62362/omsz2018.
Texto completoDjizanne, Hippolyte, Benoit Brouard, Grégoire Hévin y Carelle Lekoko. "Stabilité mécanique à long terme des cavités salines de stockage d’hydrogène". Revue Française de Géotechnique, n.º 177 (2023): 3. http://dx.doi.org/10.1051/geotech/2024023.
Texto completoPEIGNIER, Ingrid, Nathalie DE MARCELLIS-WARIN y Martin TRÉPANIER. "Portrait des pratiques organisationnelles de sécurité des transporteurs routiers de matières dangereuses au québec". Revue Française de Gestion Industrielle 33, n.º 3 (1 de septiembre de 2014): 51–69. http://dx.doi.org/10.53102/2014.33.03.784.
Texto completoLe Cotty, Tristan, Élodie Maître d’Hôtel, Issoufou Porgo, Julie Subervie y Raphaël Soubeyran. "Le warrantage, un dispositif pour améliorer la sécurité alimentaire en Afrique subsaharienne". Perspective, n.º 61 (2023): 1–4. http://dx.doi.org/10.19182/perspective/37141.
Texto completoGusev, Alexander, Arnaud Leconte y Simone Lucatello. "Green Digital Transition and Data Governance". L'Europe en Formation 396, n.º 1 (13 de noviembre de 2023): 59–83. http://dx.doi.org/10.3917/eufor.396.0059.
Texto completoLiney, Thomas, Alexandre Mitov, Gbago Laurent Onivogui y Nicole Arrighi. "Les biobanques, des structures essentielles à la recherche médicale". médecine/sciences 36, n.º 3 (marzo de 2020): 274–76. http://dx.doi.org/10.1051/medsci/2020040.
Texto completoMellal, Ahmed y Abdelkader Derbal. "L’OMC et les programmes de stockage publics à des fins de sécurité alimentaire dans les PED : avancées et perspectives". Dirassat Journal Economic Issue 11, n.º 1 (1 de enero de 2020): 547–66. http://dx.doi.org/10.34118/djei.v11i1.118.
Texto completoEtienne Kenfack, Pierre. "Limiter la braderie des terres d'Afrique centrale : un enjeu de portée planétaire". Revue Juridique de l'Environnement 43, n.º 1 (2018): 33–42. http://dx.doi.org/10.3406/rjenv.2018.7191.
Texto completoOhayon, A., M. Rousseau, N. Fuss, I. Vincent, A. M. Taburet y S. Drouot. "Sécuriser le stockage pour prévenir les erreurs liées à l’administration du KCl injectable (KCl inj)". Le Pharmacien Hospitalier et Clinicien 48, n.º 4 (diciembre de 2013): 264. http://dx.doi.org/10.1016/j.phclin.2013.10.025.
Texto completoRochard, Joël. "Le secteur viticole face au défi alimentaire mondial : intérêt de la protection des vignobles de forte pente, peu valorisables pour les cultures vivrières". BIO Web of Conferences 56 (2023): 04001. http://dx.doi.org/10.1051/bioconf/20235604001.
Texto completoTesis sobre el tema "Stockage sécurisé"
Ton, That Dai Hai. "Gestion efficace et partage sécurisé des traces de mobilité". Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLV003/document.
Texto completoNowadays, the advances in the development of mobile devices, as well as embedded sensors have permitted an unprecedented number of services to the user. At the same time, most mobile devices generate, store and communicate a large amount of personal information continuously. While managing personal information on the mobile devices is still a big challenge, sharing and accessing these information in a safe and secure way is always an open and hot topic. Personal mobile devices may have various form factors such as mobile phones, smart devices, stick computers, secure tokens or etc. It could be used to record, sense, store data of user's context or environment surrounding him. The most common contextual information is user's location. Personal data generated and stored on these devices is valuable for many applications or services to user, but it is sensitive and needs to be protected in order to ensure the individual privacy. In particular, most mobile applications have access to accurate and real-time location information, raising serious privacy concerns for their users.In this dissertation, we dedicate the two parts to manage the location traces, i.e. the spatio-temporal data on mobile devices. In particular, we offer an extension of spatio-temporal data types and operators for embedded environments. These data types reconcile the features of spatio-temporal data with the embedded requirements by offering an optimal data presentation called Spatio-temporal object (STOB) dedicated for embedded devices. More importantly, in order to optimize the query processing, we also propose an efficient indexing technique for spatio-temporal data called TRIFL designed for flash storage. TRIFL stands for TRajectory Index for Flash memory. It exploits unique properties of trajectory insertion, and optimizes the data structure for the behavior of flash and the buffer cache. These ideas allow TRIFL to archive much better performance in both Flash and magnetic storage compared to its competitors.Additionally, we also investigate the protect user's sensitive information in the remaining part of this thesis by offering a privacy-aware protocol for participatory sensing applications called PAMPAS. PAMPAS relies on secure hardware solutions and proposes a user-centric privacy-aware protocol that fully protects personal data while taking advantage of distributed computing. For this to be done, we also propose a partitioning algorithm an aggregate algorithm in PAMPAS. This combination drastically reduces the overall costs making it possible to run the protocol in near real-time at a large scale of participants, without any personal information leakage
Vasilopoulos, Dimitrios. "Reconciling cloud storage functionalities with security : proofs of storage with data reliability and secure deduplication". Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS399.
Texto completoIn this thesis we study in depth the problem of verifiability in cloud storage systems. We study Proofs of Storage -a family of cryptographic protocols that enable a cloud storage provider to prove to a user that the integrity of her data has not been compromised- and we identify their limitations with respect to two key characteristics of cloud storage systems, namely, reliable data storage with automatic maintenance and data deduplication. To cope with the first characteristic, we introduce the notion of Proofs of Data Reliability, a comprehensive verification scheme that aims to resolve the conflict between reliable data storage verification and automatic maintenance. We further propose two Proofs of Data Reliability schemes, namely POROS and PORTOS, that succeed in verifying reliable data storage and, at the same time, enable the cloud storage provider to autonomously perform automatic maintenance operations. As regards to the second characteristic, we address the conflict between Proofs of Storage and deduplication. More precisely, inspired by previous attempts in solving the problem of deduplicating encrypted data, we propose message-locked PoR, a solution that combines Proofs of Storage with deduplication. In addition, we propose a novel message-locked key generation protocol which is more resilient against off-line dictionary attacks compared to existing solutions
Qiu, Han. "Une architecture de protection des données efficace basée sur la fragmentation et le cryptage". Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0049.
Texto completoIn this thesis, a completely revisited data protection scheme based on selective encryption is presented. First, this new scheme is agnostic in term of data format, second it has a parallel architecture using GPGPU allowing performance to be at least comparable to full encryption algorithms. Bitmap, as a special uncompressed multimedia format, is addressed as a first use case. Discrete Cosine Transform (DCT) is the first transformation for splitting fragments, getting data protection, and storing data separately on local device and cloud servers. This work has largely improved the previous published ones for bitmap protection by providing new designs and practical experimentations. General purpose graphic processing unit (GPGPU) is exploited as an accelerator to guarantee the efficiency of the calculation compared with traditional full encryption algorithms. Then, an agnostic selective encryption based on lossless Discrete Wavelet Transform (DWT) is presented. This design, with practical experimentations on different hardware configurations, provides strong level of protection and good performance at the same time plus flexible storage dispersion schemes. Therefore, our agnostic data protection and transmission solution combining fragmentation, encryption, and dispersion is made available for a wide range of end-user applications. Also a complete set of security analysis are deployed to test the level of provided protection
Jemel, Mayssa. "Stockage des données locales : sécurité et disponibilité". Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0053.
Texto completoDue to technological advancements, people are constantly manipulating multiple connected and smart devices in their daily lives. Cross-device data management, therefore, remains the concern of several academic and industrial studies. The proposed frameworks are mainly based on proprietary solutions called private or closed solutions. This strategy has shown its deficiency on security issues, cost, developer support and customization. In recent years, however, the Web has faced a revolution in developing standardized solutions triggered by the significant improvements of HTML5. With this new version, innovative features and APIs are introduced to follow business and user requirements. The main purpose is to provide the web developer with a vendor-neutral language that enables the implementation of competing application with lower cost. These applications are related neither to the used devices nor to the installed software. The main motivation of this PhD thesis is to migrate towards the adoption of standardized solutions to ensure secure and reliable cross-device data management in both the client and server side. There is already a proposed standardized Cloud Digital Safe on the server side storage that follows the AFNOR specification while there is no standardized solution yet on the client-side. This thesis is focused on two main areas : 1) the proposal of a standardized Client Digital Safe where user data are stored locally and 2) the synchronization of these data between the Client and the Cloud Digital Safe and between the different user devices. We contribute in this research area in three ways. First, we propose a Client Digital Safe based on HTML5 Local Storage APIs. We start by strengthening the security of these APIs to be used by our Client Digital Safe. Second, we propose an efficient synchronization protocol called SyncDS with minimum resource consumption that ensures the synchronization of user data between the Client and the Cloud Digital Safe. Finally, we address security concerns, in particular, the access control on data sharing following the Digital Safe requirements
Chiquet, Pierre. "Mécanismes thermophysiques déterminant la sécurité du stockage géologique du CO2". Pau, 2006. http://www.theses.fr/2006PAUU3045.
Texto completoCO2 underground storage as an option for reducing greenhouse gases emissions consists of trapping industrial CO2 and injecting it into deep geological formations such as saline aquifers and hydrocarbons reservoirs. This study aims at assessing leakage processes and evaluating storage capacities. To this end, two leakage phenomena were considered, caprock capillary breakthrough and diffusional transport. The former involves interfacial properties of the brine/CO2/mineral system: brine/CO2 interfacial tension and rock wettability under dense CO2. Chapter one presents a series of IFT measurements performed at temperatures and pressures up to 45 MPa-110°C. Results show a great decrease of IFT with pressure in the 0-to-20 MPa range beyond what it tends to stabilize at values in the order of 25-30 mN. M-1. Chapter two deals with rock wettability. Dynamic contact angles were measured on muscovite mica and quartz up to 10 MPa. Results highlight an alteration of wettability with pressure that was accounted for by means of a DLVO based model. Direct capillary entry pressures on a clay stone sample are proposed in chapter three. Diffusion, is treated in chapter four. We used the Taylor dispersion method to measure D up to 40 MPa. Results indicate low values in the order of 2. 10-9 m2. S-1. Chapter five discuses the consequences of the previous parameters in terms of storage capacity
Shah, Virenkumar. "Propriétés interfaciales contrôlant la sécurité du stockage géologique des gaz acides". Pau, 2008. http://www.theses.fr/2008PAUU3015.
Texto completoAcid gas geological storage is a process under which acid gas (CO2, H2S) is injected in a geological formation and thus stored away from the atmosphere for a long time (hundreds of years). It is a promising process to reduce CO2 atmospheric emissions and an alternative to the transformation of H2S into sulphur by the Claus process. In this process, the acid gas buoyantly rises to the top of the formation and accumulates beneath the caprock, a low permeable medium imbibed with water. This thesis investigates the interfacial properties involved in capillary failure of the caprock: water/acid gas interfacial tension (IFT) and caprock’s water-wettability. It presents the first ever systematic IFT and contact angle measurements under storage conditions (up to 150 bar and 120°C) with H2S-rich acid gases, as well as a model to predict IFTs between water and non-polar or slightly-polar compounds. Water/H2S IFT decreases with increasing pressure and levels off at around 9-10 mN/m at high pressure and temperature (T ≥ 70°C, P > 120 bar). However, wettability alteration due to the presence of dense acid gas is limited in the case of natural and model substrates typically present in the caprock, except in the case of mica, which exhibits pronounced alteration in the presence of H2S. These properties have a strong impact on various quantities of practical interest in geological storage, such as the maximum injection and storage pressure and potential storage capacity of a given formation. These quantities are significantly lowered in the case of H2S-rich gas as compared to CH4 and even CO2; they should be carefully determined when planning an acid gas geological storage operation
Oualha, Nouha. "Sécurité et coopération pour le stockage de donnéees pair-à-pair". Paris, ENST, 2009. http://www.theses.fr/2009ENST0028.
Texto completoSelf-organizing algorithms and protocols have recently received a lot of interest in mobile ad-hoc networks as well as in peer-to-peer (P2P) systems, as illustrated by file sharing or VoIP. P2P storage, whereby peers collectively leverage their storage resources towards ensuring the reliability and availability of user data, is an emerging field of application. P2P storage however brings up far-reaching security issues that have to be dealt with, in particular with respect to peer selfishness, as illustrated by free-riding attacks. The continuous observation of the behavior of peers and monitoring of the storage process is an important requirement to secure a storage system against such attacks. Detecting peer misbehavior requires appropriate primitives like proof of data possession, a form of proof of knowledge whereby the holder interactively tries to convince the verifier that it possesses some data without actually retrieving them or copying them at the verifier. We propose and review several proof of data possession protocols. We in particular study how data verification and maintenance can be handed over to volunteers to accommodate peer churn. We then propose two mechanisms, one based on reputation and the other on remuneration, for enforcing cooperation by means of such data possession verification protocols, as periodically delivered by storage peers. We assess the effectiveness of such incentives with game theoretical techniques. We in particular discuss the use of non-cooperative one-stage and repeated Bayesian games as well as that of evolutionary games
Sanchez, Bernard. "Insécurité des approvisionnements pétroliers et effet externe : le cas du stockage de sécurité". Montpellier 1, 1997. http://www.theses.fr/1997MON10007.
Texto completoChaou, Samira. "Modélisation et analyse de la sécurité dans un système de stockage pair-à-pair". Phd thesis, Université d'Evry-Val d'Essonne, 2013. http://tel.archives-ouvertes.fr/tel-00877094.
Texto completoCavalcante, Janaide. "Traitement des sables à la bentonite pour la constitution de la barrière de sécurité passive des centres de stockage de déchets". Lyon, INSA, 1995. http://www.theses.fr/1995ISAL0027.
Texto completo[This work is carry out on impervious barriers destined for landfill engineering composed by compacted sand-bentonite mixtures. French regulations require a barrier with a permeability less than lE-09rn/s. Standard tests often used in geotechnical engineering has allowed possible the establishment of a methodology to verify the behavoiur of this barrier during the presence of leachate. In the first part we have sought to define from swell tests and Atterberg limits tests the interactions bentonite-leachates. We realised the permeability testing to water and leachate for various samples constituted of compacted sand-bentonite mixtures. Emperical models allowed to estimate the permeability, tests results, experimental results and tests methods are proposed. ]
Libros sobre el tema "Stockage sécurisé"
Implantation d'un site de stockage de déchets nucléaires: Sécurité et problèmes urbanistiques. Paris: L'Harmattan, 2008.
Buscar texto completoConseil canadien es ministres de l'environnement., ed. Code de recommendations techniques pour la protection de l'environnement applicable aux systèmes de stockage hors sol et souterrains de produits pétroliers et de produits apparentés. Winnipeg, Man: Conseil canadien des ministres de l'environnement, 2003.
Buscar texto completoTanks, Canadian Council of Ministers of the Environment National Task Force on Storage. Environmental code of practice for aboveground storage tank systems containing petroleum products. [Ottawa]: Published by the National Task Force on Storage Tanks for the Canadian Council of Ministers of the Environment, 1994.
Buscar texto completoCanadian Council of Ministers of the Environment. National Task Force on Storage Tanks. Environmental code of practice for aboveground storage tank systems containing petroleum products. [Ottawa]: Minister of Supply and Services, 1994.
Buscar texto completoCanadian Council of Ministers of the Environment. Environmental code of practice for aboveground and underground storage tank systems containing petroleum and allied petroleum products. Winnipeg: Canadian Council of Ministers of the Environment, 2003.
Buscar texto completoGuidance on assigning ignition probabilities in onshore and offshore quantitative risk assessments. 2a ed. London: Energy Institute, 2019.
Buscar texto completoOsti, Giorgio. Storage and Scarcity: New Practices for Food, Energy and Water. Taylor & Francis Group, 2016.
Buscar texto completoStorage and Scarcity: New Practices for Food, Energy and Water. Taylor & Francis Group, 2016.
Buscar texto completoOsti, Giorgio. Storage and Scarcity. Taylor & Francis Group, 2020.
Buscar texto completoCapítulos de libros sobre el tema "Stockage sécurisé"
WACHTEL, Cl. "85 ans après, un risque toujours présent". En Médecine et Armées Vol. 45 No.1, 81–86. Editions des archives contemporaines, 2017. http://dx.doi.org/10.17184/eac.7460.
Texto completoPUTEAUX, Pauline y William PUECH. "Insertion de données cachées dans le domaine chiffré". En Sécurité multimédia 2, 233–77. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9027.ch7.
Texto completoITIER, Vincent, Pauline PUTEAUX y William PUECH. "Crypto-compression d’images". En Sécurité multimédia 2, 105–44. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9027.ch4.
Texto completoAYMEN CHALOUF, Mohamed, Hana MEJRI y Omessaad HAMDI. "Intelligence artificielle pour la sécurité en e-santé". En Gestion de la sécurité en e-santé, 213–35. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9179.ch9.
Texto completoInformes sobre el tema "Stockage sécurisé"
Fontecave, Marc y Candel Sébastien. Quelles perspectives énergétiques pour la biomasse ? Académie des sciences, enero de 2024. http://dx.doi.org/10.62686/1.
Texto completo