Littérature scientifique sur le sujet « Informatique nuage »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Informatique nuage ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Informatique nuage"
Guillot, Philippe, et Marie-José Durand-Richard. « Informatique et cryptologie : un déplacement des frontières ». Intellectica. Revue de l'Association pour la Recherche Cognitive 72, no 1 (2020) : 141–57. http://dx.doi.org/10.3406/intel.2020.1950.
Texte intégralBarrat, Olivier. « Informatique en nuage : mettez de côté le PATRIOT Act, penchez-vous sur FISAA ! » Sécurité et stratégie 14, no 3 (2013) : 64. http://dx.doi.org/10.3917/sestr.014.0064.
Texte intégralSobczak, Anna. « Public Cloud Archives : Dream or Reality ? / Les archives publiques dans le nuage informatique : Rêve ou réalité ? » Canadian Journal of Information and Library Science 39, no 2 (2015) : 228–34. http://dx.doi.org/10.1353/ils.2015.0014.
Texte intégralFranks, Patricia C. « New Technologies, New Challenges : Records Retention and Disposition in a Cloud Environment / Nouvelles technologies, nouveaux défis : Conservation et déclassement des documents dans un environnement de nuage informatique ». Canadian Journal of Information and Library Science 39, no 2 (2015) : 191–209. http://dx.doi.org/10.1353/ils.2015.0011.
Texte intégralZins, Marie, Marc Cuggia et Marcel Goldberg. « Les données de santé en France ». médecine/sciences 37, no 2 (février 2021) : 179–84. http://dx.doi.org/10.1051/medsci/2021001.
Texte intégralHintermann, Francis. « Informatique : la révolution des nuages ». L'Expansion Management Review N° 139, no 4 (2010) : 98. http://dx.doi.org/10.3917/emr.139.0098.
Texte intégralStancic, Hrvoje, Arian Rajh et Hrvoje Brzica. « Archival Cloud Services : Portability, Continuity, and Sustainability Aspects of Long-term Preservation of Electronically Signed Records / Les services d’archivage dans un nuage informatique : Portabilité, continuité et durabilité : Aspects de la conservation à long terme des documents signés électroniquement ». Canadian Journal of Information and Library Science 39, no 2 (2015) : 210–27. http://dx.doi.org/10.1353/ils.2015.0012.
Texte intégralCaron, Daniel J., et Richard G. Brown. « Des grottes de Lascaux aux nuages de Google : le bouleversement des systèmes de l’écrit et son incidence sur le fonctionnement de nos institutions démocratiques ». Télescope 18, no 1-2 (29 mai 2012) : 155–67. http://dx.doi.org/10.7202/1009261ar.
Texte intégralVanderburgh, David. « Breast cancer screening ». Politics and the Life Sciences 37, no 1 (2018) : 135–40. http://dx.doi.org/10.1017/pls.2018.3.
Texte intégralRoyer, Michael F., et Christopher Wharton. « The Design and Testing of a Text Message for Use as an Informational Nudge in a Novel Food Insecurity Intervention ». Challenges 14, no 4 (1 octobre 2023) : 40. http://dx.doi.org/10.3390/challe14040040.
Texte intégralThèses sur le sujet "Informatique nuage"
Degoutin, Stéphane. « Société-nuage ». Thesis, Paris Est, 2019. http://www.theses.fr/2019PESC1009.
Texte intégralThis book unfolds, like a Chinese landscape painting through which the viewer’s gaze wanders slowly. I describe a panorama. It is not made of mountains in the mist or bushes swept by the wind, but of data centers, automated warehouses, social network feeds...I explore the hypothesis that the Internet is part of a general process that reduces society and materials to small-scale components, which allow its mechanisms to become more fluid. A chemist’s idea – the decomposition of matter into powder to facilitate its recomposition – is also applied to social relations, memory and humans in general.Just as the reduction of matter accelerates chemical reactions, the reduction of society to powder allows for an accelerated decomposition and recomposition of all from which humans are made. It allows to multiply the reactions within society, to accelerate the productions of humanity and the social chemistry : combination of human passions (Charles Fourier), hyperfragmentation of work (Mechanical Turk), decomposition of knowledge (Paul Otlet), Internet of neurons (Michael Chorost), agregation of micro affects (Facebook). This is what I call the « society as cloud »
Etchevers, Xavier. « Déploiement d'applications patrimoniales en environnements de type informatique dans le nuage ». Phd thesis, Université de Grenoble, 2012. http://tel.archives-ouvertes.fr/tel-00875559.
Texte intégralEtchevers, Xavier. « Déploiement d’applications patrimoniales en environnements de type informatique dans le nuage ». Thesis, Grenoble, 2012. http://www.theses.fr/2012GRENM100/document.
Texte intégralCloud computing aims to cut down on the outlay and operational expenses involved in setting up and running applications. To do this, an application is split into a set of virtualized hardware and software resources. This virtualized application can be autonomously managed, making it responsive to the dynamic changes affecting its running environment. This is referred to as Application Life-cycle Management (ALM). In cloud computing, ALM is a growing but immature market, with many offers claiming to significantly improve productivity. However, all these solutions are faced with a major restriction: the duality between the level of autonomy they offer and the type of applications they can handle. To address this, this thesis focuses on managing the initial deployment of an application to demonstrate that the duality is artificial. The main contributions of this work are presented in a platform named VAMP (Virtual Applications Management Platform). VAMP can deploy any legacy application distributed in the cloud, in an autonomous, generic and reliable way. It consists of: • a component-based model to describe the elements making up an application and their projection on the running infrastructure, as well as the dependencies binding them in the applicative architecture; • an asynchronous, distributed and reliable protocol for self-configuration and self-activation of the application; • mechanisms ensuring the reliability of the VAMP system itself. Beyond implementing the solution, the most critical aspects of running VAMP have been formally verified using model checking tools. A validation step was also used to demonstrate the genericity of the proposal through various real-life implementations
Gadhgadhi, Ridha. « Openicra : vers un modèle générique de déploiement automatisé des applications dans le nuage informatique ». Mémoire, École de technologie supérieure, 2013. http://espace.etsmtl.ca/1222/1/GADHGADHI_Ridha.pdf.
Texte intégralLejemble, Thibault. « Analyse multi-échelle de nuage de points ». Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30184.
Texte intégral3D acquisition techniques like photogrammetry and laser scanning are commonly used in numerous fields such as reverse engineering, archeology, robotics and urban planning. The main objective is to get virtual versions of real objects in order to visualize, analyze and process them easily. Acquisition techniques become more and more powerful and affordable which creates important needs to process efficiently the resulting various and massive 3D data. Data are usually obtained in the form of unstructured 3D point cloud sampling the scanned surface. Traditional signal processing methods cannot be directly applied due to the lack of spatial parametrization. Points are only represented by their 3D coordinates without any particular order. This thesis focuses on the notion of scale of analysis defined by the size of the neighborhood used to locally characterize the point-sampled surface. The analysis at different scales enables to consider various shapes which increases the analysis pertinence and the robustness to acquired data imperfections. We first present some theoretical and practical results on curvature estimation adapted to a multi-scale and multi-resolution representation of point clouds. They are used to develop multi-scale algorithms for the recognition of planar and anisotropic shapes such as cylinders and feature curves. Finally, we propose to compute a global 2D parametrization of the underlying surface directly from the 3D unstructured point cloud
Malvault, Willy. « Vers une architecture pair-à-pair pour l'informatique dans le nuage ». Phd thesis, Université de Grenoble, 2011. http://tel.archives-ouvertes.fr/tel-00633787.
Texte intégralGuesmi, Asma. « Spécification et analyse formelles des politiques de sécurité dans un processus de courtage de l'informatique en nuage ». Thesis, Orléans, 2016. http://www.theses.fr/2016ORLE2010/document.
Texte intégralThe number of cloud offerings increases rapidly. Therefore, it is difficult for clients to select the adequate cloud providers which fit their needs. In this thesis, we introduce a cloud service brokerage mechanism that considers the client security requirements. We consider two types of the client requirements. The amount of resources is represented by the functional requirements. The non-functional requirements consist on security properties and placement constraints. The requirements and the offers are specified using the Alloy language. To eliminate inner conflicts within customers requirements, and to match the cloud providers offers with these customers requirements, we use a formal analysis tool: Alloy. The broker uses a matching algorithm to place the required resources in the adequate cloud providers, in a way that fulfills all customer requirements, including security properties. The broker checks that the placement configuration ensures all the security requirements. All these steps are done before the resources deployment in the cloud computing. This allows to detect the conflicts and errors in the clients requirements, thus resources vulnerabilities can be avoided after the deployment
Alvares, De Oliveira Junior Frederico. « Gestion multi autonome pour l'optimisation de la consommation énergétique sur les infrastructures en nuage ». Phd thesis, Université de Nantes, 2013. http://tel.archives-ouvertes.fr/tel-00853575.
Texte intégralCostache, Stefania. « Gestion autonome des ressources et des applications dans un nuage informatique selon une approche fondée sur un marché ». Phd thesis, Université Rennes 1, 2013. http://tel.archives-ouvertes.fr/tel-00925352.
Texte intégralDemir, Levent. « Module de confiance pour externalisation de données dans le Cloud ». Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM083/document.
Texte intégralData outsourcing to the Cloud has led to new security threats. The main concerns of this thesis are to protect the user data and privacy. In particular, it follows two principles : to decrease the necessary amount of trust towards the Cloud, and to design an architecture based on a trusted module between the Cloud and the clients. Both principles are derived from a new design approach : "Trust The Module, Not The Cloud ".Gathering all the cryptographic operations in a dedicated module allows several advantages : a liberation from internal and external attacks on client side ; the limitation of software to the essential needs offers a better control of the system ; using co-processors for cryptographic operations leads to higher performance.The thesis work is structured into three main sections. In the first section , we confront challenges of a personal Cloud, designed to protect the users’ data and based on a common and cheap single-board computer. The architecture relies on two main foundations : a transparent encryption scheme based on Full Disk Encryption (FDE), initially used for local encryption (e.g., hard disks), and a transparent distribution method that works through iSCSI network protocol in order to outsource containers in Cloud.In the second section we deal with the performance issue related to FDE. By analysing the XTS-AES mode of encryption, the Linux kernel module dm-crypt and the cryptographic co-processors, we introduce a new approach called extReq which extends the cryptographic requests sent to the co-processors. This optimisation has doubled the encryption and decryption throughput.In the final third section we establish a Cloud for enterprises based on a more powerful and certified Hardware Security Module (HSM) which is dedicated to data encryption and keys protection. Based on the TTM architecture, we added "on-the-shelf" features to provide a solution for enterprise
Livres sur le sujet "Informatique nuage"
Sauveur, Paula. La protection du secret commercial dans les nuages publics de l'infonuagique (cloud computing). Cowansville, Québec : Éditions Y. Blais, 2013.
Trouver le texte intégralLin, Simon C., et Eric Yen. Managed grids and cloud systems in the Asia-Pacific research community. New York : Springer, 2010.
Trouver le texte intégralInternational Workshop on Grid Economics and Business Models (7th 2010 Ischia, Italy). Economics of grids, clouds, systems, and services : 7th international workshop, GECON 2010, Ischia, Italy, August 31, 2010 : proceedings. Berlin : Springer, 2010.
Trouver le texte intégralCloud Security and Privacy : An Enterprise Perspective on Risks and Compliance. O'Reilly, 2009.
Trouver le texte intégralCloud Security and Privacy : An Enterprise Perspective on Risks and Compliance. O'Reilly, 2009.
Trouver le texte intégralLin, Simon C., et Eric Yen. Managed Grids and Cloud Systems in the Asia-Pacific Research Community. Springer, 2014.
Trouver le texte intégralLin, Simon C., et Eric Yen. Managed Grids and Cloud Systems in the Asia-Pacific Research Community. Springer, 2010.
Trouver le texte intégralChapitres de livres sur le sujet "Informatique nuage"
FALSAFI, Babak. « Architecture de serveur pour un centre de données post-Moore ». Dans Systèmes multiprocesseurs sur puce 2, 159–72. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9022.ch6.
Texte intégralRapports d'organisations sur le sujet "Informatique nuage"
Heller, Lorena, Rodrigo López et Ricardo Nogales. Nudging Self-employed Women to Contribute to Social Security. Inter-American Development Bank, octobre 2024. http://dx.doi.org/10.18235/0013144.
Texte intégral