Thèses sur le sujet « Mécanisme de gestion de la confiance »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleures thèses pour votre recherche sur le sujet « Mécanisme de gestion de la confiance ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.
Masmoudi, Mariam. « Prévention des attaques de confiance en temps réel dans l'IoT social ». Electronic Thesis or Diss., Toulouse 3, 2023. http://www.theses.fr/2023TOU30302.
Texte intégralThe social IoT is a new paradigm that enhances the navigability of IoT networks and boosts service discovery by integrating social contexts. Nonetheless, this paradigm faces several challenges that reduce its performance quality. Trust, particularly trust attacks, is one of the most significant challenges. Some users resort to malicious behaviors and launch attacks to propagate malicious services. A trust management mechanism has become a major requirement in Social IoT to prevent these attacks in real-time and ensure trustworthy experiences for end-users. However, few studies have addressed trust management issues to prevent trust attacks in Social IoT environments. Most studies have been conducted to detect offline attacks with or without specifying the type of attack performed. Moreover, they did not consider security properties, such as cryptography, transparency, and immutability, etc. In fact, we must continuously process transactions to prevent these attacks at the transaction generation level while maintaining security properties. For this, we compared the previously used techniques and technologies, whose common point is attack prevention in the SN and IoT areas. Based on these comparisons, we indicated that blockchain technology can assist in developing a trust management mechanism that can prevent trust attacks while maintaining security. For real-time prevention, we proposed the combination of a distributed stream processing engine, known as Apache Spark, with blockchain technology. Our choice is based on a comparison of open-source data-stream processing engines. As a result, we propose a new trust management mechanism, based on blockchain and Apache Spark. This mechanism permit to prevent in real-time all trust attack types performed by malicious nodes, in order to obtain a reliable environment. Experimentation made on a real data-set enable us to prove the performance of our proposition
Neuville, Jean-Philippe. « Le contrat de confiance : étude des mécanismes de coopération dans le partenariat industriel autour de deux grands constructeurs automobiles européens ». Paris, Institut d'études politiques, 1996. http://www.theses.fr/1996IEPP0005.
Texte intégralThe industrial partnership is one of the possible forms of the organized action between market and hierarchy. With the tools of the sociological analysis of organizations, an empirical comparison of two partnerships is carried out in the automobile manufacturing sector in europe. Results show that this form of industrial cooperation is characterized, first by a common framework : quality ; second; by a specific regulation mecanism : trust ; finally, by a structure of social exchange in which economic exchange is embedded in : interpersonal networks
Chaulet, Johann. « La confiance médiatisée : la confiance et sa gestion au sein des communications médiatisées ». Toulouse 2, 2007. https://hal.archives-ouvertes.fr/tel-01252308.
Texte intégralThis thesis is about the usages of mediated communication devices. Its aim is to understand how their generalization renews the way people “equip” and deal with their trust relationships. This interest for the notion of trust leads us to place the questions of information, availability, commitment and surveillance in the center of our analysis. Due to the pertinence of this broadening the study of “close relationships” has been complemented by relations centered around a specific goal (via the study of internet connecting websites) and contractual relationships in very equipped work places (in call centers). The diversity of these situations allows us to examine the confrontation of the two main concepts of mediation and trust. It seems that, if these mediations don't change the main grounds of trust, they do modify some aspects of relations to others and the uncertainty they imply. Our findings document the hypothesis of growing rationalization of communication and relational practices based, mainly, on new information that those always more numerous mediations produce
Vu, Van-Hoan. « Infrastructure de gestion de la confiance sur internet ». Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2010. http://tel.archives-ouvertes.fr/tel-00611839.
Texte intégralMasmoudi, Khaled. « Gestion de la confiance dans les réseaux personnels ». Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0002.
Texte intégralWith the advent of new networking paradigms and evolutions, spanning from distributed and self-organized systems such as ad hoc networks, P2P networks or grids, to pervasive computing, wireless mesh networks or embedded devices, many research effort have been conducted to bring the previous theoretic concepts into real life. Security protocols have to fulfill a new requirement : how is it possible to establish trust between parties without any a priori credential, central administration or shared context ? We go even farther in this dissertation : what if each single party was a heterogeneous distributed domain ? This thesis builds a layered architecture with a set of cryptographic protocols, meant to establish trust between devices and services belonging to different users through their Personal Networks. In the first part, the trust vector is an out-of-band channel, based on proximity. The resulting protocols combine identity-based cryptography to link identities to cryptographic material, and cryptographically-generated addresses to provide identity ownership. These new identifiers form a novel namespace that allows cross-layer trust establishment. The de facto security negotiation protocols, namely Internet Key Exchange protocol and Transport layer Security handshake sub-protocol, provide end-to-end secure tunnel establishment, but fail to fit scenarios when a domain controller has to define the security parameters for a device under its supervision. We define in the second part of this dissertation how extensions could be applied to fullfill the previous requirement and delegate tunnel negotiation to a third party. Security validation results and the details of a preliminary implementation are also provided. Last, we design a framework for establishing trust basing on the entity behavior within a group of Personal Networks that share a part of their devices and services. Focusing on service discovery, we show that reputation-based trust can be applied to mitigate selfishness and fake announcements in a federation of Personal Networks
Dementhon, Agathe. « De la confiance aux représentations sociales : un nouvel éclairage théorique du concept de confiance : le cas de la confiance dans l'achat industriel ». Paris 10, 2001. http://www.theses.fr/2001PA100013.
Texte intégralWazan, Ahmad Samer. « Gestion de la confiance dans les infrastructures à clés publiques ». Toulouse 3, 2011. http://thesesups.ups-tlse.fr/1450/.
Texte intégralToday, the Internet has become a universal community, where the openness to diverse application areas, has been accompanied by a natural change in the profile of users. However, in this environment, the maturity of the services and applications is suffering from a problem of trust. The establishment of trust in the Internet requires the intervention of several elements. We refer to these elements by the term: trust chain. In all chains of trust, public key infrastructure (PKI) is a central element. It serves to establish a link between a public key and a physical entity whose certificate signed by a central entity called a certification authority (CA). Thus, PKIs provide means for the management and the distribution of keys and certificates. All elements of the trust chain create a trust management problem. We have dedicated our work, however, to PKIs, and more precisely in trust management of CAs. We have performed the following steps: • We have proposed a formal definition of trust in CAs. • We have defined an architecture that operates a validation service deployed by an entity independent of CAs, and recognized by a community of interest. • We have defined a calculation model that enables us to obtain a score between 0 and 1 representing the quality of a certificate (QoCER). Finally, we have implemented a prototype that demonstrates our ideas. In particular, we have presented how end users can interact with the validation service to make informed decisions about certificates
Hasrouny, Hamssa. « Gestion de confiance et solutions de sécurité pour les réseaux véhiculaires ». Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0001/document.
Texte intégralVANETs (Vehicular Ad-hoc Networks) consist of vehicles capable of exchanging information by radio to improve road safety (alerts in case of accidents or in case of abnormal slowdowns, collaborative driving…) or allow internet access for passengers (collaborative networks, infotainment, etc.). Road safety messages exchanged between vehicles may be falsified or eliminated by malicious entities in order to cause accidents and endanger people life. In this thesis, we focus on defining, designing and evaluating a security solution for V2V communications in VANET, to ensure a secure communication and a good level of confidence between the different participating vehicles. Adopting a group-based model, we consider the Trustworthiness evaluation of vehicles participating in VANET and we develop a Trust Model to analyze the behavior of the vehicles in the group while preserving the privacy of the participants and maintaining low network overhead. We then propose a hierarchical and modular framework for Misbehavior Detection and Revocation Management
Hasrouny, Hamssa. « Gestion de confiance et solutions de sécurité pour les réseaux véhiculaires ». Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0001.
Texte intégralVANETs (Vehicular Ad-hoc Networks) consist of vehicles capable of exchanging information by radio to improve road safety (alerts in case of accidents or in case of abnormal slowdowns, collaborative driving…) or allow internet access for passengers (collaborative networks, infotainment, etc.). Road safety messages exchanged between vehicles may be falsified or eliminated by malicious entities in order to cause accidents and endanger people life. In this thesis, we focus on defining, designing and evaluating a security solution for V2V communications in VANET, to ensure a secure communication and a good level of confidence between the different participating vehicles. Adopting a group-based model, we consider the Trustworthiness evaluation of vehicles participating in VANET and we develop a Trust Model to analyze the behavior of the vehicles in the group while preserving the privacy of the participants and maintaining low network overhead. We then propose a hierarchical and modular framework for Misbehavior Detection and Revocation Management
Coste, Benjamin. « Détection contextuelle de cyberattaques par gestion de confiance à bord d'un navire ». Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0106/document.
Texte intégralNavigation and ship’s management are two essential aspects for the security of the ship itself and people on board as much as the maritime environment protection. Modern ships ensure these functions by increasingly embedding connected and automated technologies such as sensors, actuators, programmable logic controllers and pieces of software. However, the security of this objects as well as the trust in the information they produce cannot be guaranteed: they can be deceived or under the control of a malicious third party. In this context, a novel approach of data falsification detection is proposed. It is based on trust assessment of information system components which can be seen as inter-related functional blocks producing, processing and receiving pieces of information. The trust one can have inproduction blocks, called information sources, is assessed through its ability to report real situation of the ship. Trust is then propagated to the remainder part of the system. A simulator was made thanks to which we experiment several scenarios including intentional modification of numerical data. In these cases and under some conditions, the variability of trust give us the ability to identify the attack occurrence as much as its target. Our proposition is not restricted to naval information systems and can be employed in various situations even with human factor
Anouboussi, Joseph. « Mécanisme réputationnel, traitement de l'asymétrie informationnelle et efficience de l'allocation du crédit : le cas des Institutions Bancaires Formelles et des Institutions Bancaires Décentralisées en période de post-libéralisation financière au Cameroun ». Thesis, Lyon 2, 2011. http://www.theses.fr/2011LYO22001.
Texte intégralThis thesis focusses on the problematic of the efficiency of intermediate finance on the economic growth and development processes. It concerned, on one hand, the resolution of inefficiency problems resulting from the presence of asymmetric information and uncertainty involved credit markets when reputational mechanisms implemented through banks-borrowers long-term relationships are used and, on the other hand, the conditions in which these mechanisms could emerged and expanded, in particular in a developing country such as Cameroon.The thesis thus has, at the same time, conceptual, empirical and normative purpose First of all, we tried to enrich the theoretical debate about relevance and interest of the reputational mechanism relating banking intermediation process. We show that, while in the models of agency where judicial penalties and pressures mechanisms are often ineffective and expensive, only the auto-enforceable character of the reputational mechanism is enough to guarantee its efficacious functioning. Furthermore, for us, the reputational mechanism seems better to reconcile the two usual opposite conceptions of agents behaviors that are homoeconomicus and homosociologicus. Therefore, this mechanism might constitute an interesting analysis framework for modeling banking behavior, in particular in the context of African economies where uncertainties remain aggravated and where much more economic rationalities based on the values prevail.Secondly, our statistical survey issues clearly shows that in Cameroon, with regard to decentralized financial institutions (DFIs) like Microfinance unities, formal financial institutions (FFI) seem to attach less importance to reputational practices in their capital allowance behaviour, especially to small and medium-sized enterprises (SMEs). This is likely to provide a better explanation of the differential micro-economic performance, situated here to the advantage of DFI.Finally, the same above mentioned survey strongly reveal the existence of many both internal and external factors preventing both categories of banks in a better consideration of reputational mechanisms. We then proposed axes or lines of reflection, formulated and justified a set of corporate, institutional and regulatory associated recommendations. This with the aim to build a more reliable and more solid Cameroonian banking system by inciting banks to better integrate reputational practices in their judgment of granting credits to borrowers
Venart, Alain Joseph. « Des modes de contrôle par la confiance : le cas des établissements publics locaux d'enseignement ». Nice, 2012. http://www.theses.fr/2012NICE0007.
Texte intégralDefine the room for manoeuvre of the leader of a local secondary school from the perspective of different management mechanisms between the procedures and skills, to show the limits of the mechanisms, to describe the fundamental aspects of the mechanisms from a qualitative viewpoint: these are the key issues addressed in this research. Present the structures and aims of an organization at a time of significant social and institutional change; show the key issues in terms of piloting a school in particular analyzing the new problems raised by the institutional control of the former: these are the key points of our analysis. Describe the current institutional framework, based on performance measures and comparisons between national objectives and the actual results of the schools which leads us to question the fundamentals of the management of local secondary schools Detail the key aspects of the new forms of management based on a wish for greater control in order to investigate the implementation of management through trust in local Secondary school. Call into question local secondary schools as an organization for management and the tension between skills and performance as a method for evaluating the manager, not forgetting the ethical aspects of the latter
Mercier-Wiart, Françoise. « Le management de l'école à l'épreuve de réalités éducatives et sociales. Entre confiance et défiance : étude de cas ». Lille 3, 2010. http://www.theses.fr/2010LIL30067.
Texte intégralRibière, Vincent Michel. « Le rôle primordial de la confiance dans les démarches de gestion du savoir ». Aix-Marseille 3, 2005. http://www.theses.fr/2005AIX32005.
Texte intégralIn the new economy every company looking to remain competitive must manage its intellectual capital. Knowledge Management (KM) initiatives are expanding across all types of organizations worldwide. However, not all of them are necessarily successful mainly due to an unfriendly organizational culture. Organizational trust is often mentioned as a critical factor facilitating knowledge sharing. For this research we took an empirical approach to validate this assumption. The purpose of this research is to explore the relationships between organizational trust, a knowledge management strategy (codification vs. Personalization)and its level of success. This study was conducted among 101 US companies involved in knowledge management. A survey tool was developed and validated to assess the level of trust, the level of success and the dominant KM strategy deployed by an organization. Thirteen research hypotheses and a conceptual model were tested. The findings show the impact of trust on the choice of the KM strategy as well as on the level of success. The contribution of this study may help companies and their units seeking to launch a KM initiative to choose which KM initiative to employ in order to maximize their chance of success
Couteret, Paul. « La confiance dans la relation dirigeant-adjoint en petite entreprise ». Montpellier 2, 1998. http://www.theses.fr/1998MON20023.
Texte intégralMenegon, Rémi. « Mécanisme d'incitation distribué pour la gestion de ressources de réseaux privés virtuels ». Mémoire, École de technologie supérieure, 2011. http://espace.etsmtl.ca/868/1/MENEGON_R%C3%A9mi.pdf.
Texte intégralLegrand, Véronique. « Confiance et risque pour engager un échange en milieu hostile ». Thesis, Lyon, INSA, 2013. http://www.theses.fr/2013ISAL0041.
Texte intégralNowadays, the electronic form of exchanges offers a new media able to make easy all information access, ubiquitous access, everywhere and everytime. But, at the same time, such a media - new, opened and complex - introduces unknown threats and breaches. So, how can we start up trust exchanges? From the system theory point of view, the cybernetic regulation maintains the sys-tems equilibrium with negative feedback loops. In this way, the defense line is based on a set of defense components still named Demilitarized Zone (DMZ) in order to block flow, to control anomalies and give out alerts messages if deviances are detected. Nev-ertheless, most of these messages concern only anomalies of machines and very little of human. So, messages do not take into account neither psychological behavior nor the dynamic of the context. Furthermore, messages suffer of the "big data" problem and become confused due to too much velocity, volume and variety. Finally, we can limit this problem to the understanding difficulty during the access to the specific knowledge in connection with the message. For example, the identity theft with the XSS attack is an illustration of this unfriendly environment. On the contrary, the living sciences show that organisms follow a positive regulation by where each one itself adapts according to his complexity. For that, they deploy adapted and continuous environment monitoring process still named "homeostasis". During this cycle, inputs capture information, then outputs adjust in response corre-sponding actions : this is the feedback. The strength of such a mechanism lies on the information meaning and in particular on the clues they include. In fact, some of these information include clues by which organisms can explain situations. For example, the information « attention" alludes to dangerous situation. This faculty comes from ad-vanced knowledge having first explicit relationship with this information: this relation forms what we call the "cognitive loop". To illustrate this phenomenon, the cognitive sciences often evoke "a friend immediately recognized by her friend" despite he is swal-lowed up in the crowd. But, the cognitive loop should not be broken. Like the living beings functioning, our work propose a cognitive model named Diag-nostic And Incident Model (DIM). The main idea lies on the context-aware model in order to adapt itself like "homeostasis". DIM has been founded on the principle of the "cognitive loop" where the inputs are the "logs" of numerics systems. So, in order to make easier the comparison between contextual and known situation, we will design "logs" and advanced knowledge by a common model. DIM proposes a conceptual struc-ture to extract clues from massive and various "logs” issued from environment based on advanced knowledge acquisition. Then, we propose the cognitive structure will be applied to the anomaly detection, incident management and diagnosis process
Castello, Michèle. « L'abus de gestion et le Droit pénal ». Nice, 1998. http://www.theses.fr/1998NICE0015.
Texte intégralWassmer, Martin Paul. « Untreue bei Risikogeschäften / ». Heidelberg : C. F. Müller, 1997. http://catalogue.bnf.fr/ark:/12148/cb38872478t.
Texte intégralGuerriero, Annie Halin Gilles. « La représentation de la confiance dans l'activité collective. Application à la coordination de l'activité de chantier de construction ». S. l. : INPL, 2009. http://www.scd.inpl-nancy.fr/theses/2009_GUERRIERO_A.pdf.
Texte intégralMorel, Martine. « Exploration des signaux faibles de la perte de confiance pendant une collaboration à distance ». Compiègne, 2011. http://www.theses.fr/2011COMP1934.
Texte intégralThe remote collaboration growth induces a need of new tools to compensate the perceptive instantiations of trust during a physical presence interaction. In this research about the weak signals of loss in trust, we have been interested in the perception of the loss in trust from the origin in their emotional biophysics birth until their expression in talk. Then, we have crossed the data of emotional expression of loss in trust that we had collect with an interview and with the collective production of the remote collaboration in a case of an offshore web development (European clients, Pantha Corp. Project manager in Australia) in outsourcing (Chinese a distributed software development team) using the AGILE/SCRUM method where the interactions stand everyday and only through computers. This research contributes to others referring to the link between a team emotional life and its performance. In addition Université de Technologie de Compiègne Martine MOREL Thèse en gestion 2011 Page 10 sur 442 to that, this research propose an adaptation of managerial practices of control by production scorecard, and also, of evaluation of quality, by rooting them in the analyze of interactions including their emotional component to infer on the mutual ability of stakeholders to maintain a trust relationship, this new concept is called "Quality 2. 0. " Moreover, in this Quality 2. 0 concept, the sensitive human being is placed in the center of the interaction at work. However, this research has been limited about the biophysics explorations of emotions in a situation in a remote interaction but it contributes to open more perspectives about the links
Meutelet, Allemand Isabelle. « Contribution à la théorie de la gouvernance : le marché des dirigeants, mécanisme particulier de gouvernance des entreprises ». Dijon, 2008. http://www.theses.fr/2008DIJOE003.
Texte intégralResearch today does not provide us with an overall vision of the managerial market role and its contribution to the creation of value has not been tested. This is why we sought to get a better understanding of this governance mechanism, using the synthetic theoretical grid proposed by Charreaux (2002). In addition to the fundamental function of assessing managers, five ways to intervene were identified : three disciplinary ways, the sanctioning of inefficient managers, the rewarding of competent managers and the reducing of disciplinary costs ; two cognitive ways : contributing to the strategic vision of the firm, bringing and developing skills. Our explanatory model of the role of the managerial market includes contingency factors, linked to the firm (ownership structure, industry sector) or to the manager (career concerns, proximity of the retirement, support of networks). The model takes also into account, in a systemic approach, the substitution or complementary effects of five mechanisms : the board of directors, the large shareholders, the creditors, the market for corporate control and the products market competition. An empirical study of the CEOs of French listed companies was carried out. The descriptive part draws a picture of the managerial market and profile of the managers between 1996 and 2005 in France. The tests of the explanatory model confirmed that this mechanism contributed to the value creation in the firm, through three of the identified ways to intervene. Among the factors of contingency, only ownership structure appeared significant. Taking into account the other governance mechanisms did not result in the validation of the existence of phenomena of interdependence
Abba, Hachimi. « L'esprit 4C dans l'entreprise : pour une coopération créative axée sur la communication et la confiance ». Valenciennes, 2007. http://ged.univ-valenciennes.fr/nuxeo/site/esupversions/9d8be4fa-66e8-44aa-944e-2accc1af18c7.
Texte intégralThis thesis examines project’s human dimensions, which has become a tool in business management. These dimensions were explored through two types of projects: the ISO 9001 quality certification and the implementation of a new Information System. Both projects share the same point: the difficulties, that is to say the lack of communication in the implementation of these tools of modern management. For most businesses this communicational aspect seems to easily go without saying. But, the observations we made on the field confirm the opposite. Therefore, this study consists in, on the one hand, studying projects’ communicational phenomena in business in order to understand why the human factor reacts against these tools; and on the other hand, implementing a model incorporating these human dimensions. This model called 4C has been proposed and implemented in the company. It is built around four fundamental concepts: communication, cooperation, confidence, creativity. The capitalization of the 4C model by the company and its extension to other projects in the group is a first perspective. Other research prospects will aim to improving the model along with organization and company as research laboratory
Gurviez, Patricia. « Le rôle central de la confiance dans la relation consommateur-marque ». Aix-Marseille 3, 1998. http://www.theses.fr/1998AIX32057.
Texte intégralOur objective is to introduce trust as a key variable in consumer-research, by offering a conceptual model of trust in the brand-consumer relationship. The first part consists of an epistemology of the concept of trust in the paradigms of marketing, social sciences and economics, and in the history of philosophy. The conquest of individual freedom, which is characteristic of modernity, leads to considering trust as a weak concept, seen as a calculation of subjective probabilities, or as a remnant of a pre-modern process. Part ii consists in (1) understanding the mechanisms of consumer trust, knowing that the brand value depends largely on its capacity to build this trust and (2) determining the antecedents and outcomes of trust. The analysis of literature helps to develop a conceptual model of the key role of trust in the brand-consumer relationship and to present the main hypotheses for the research. Consumer trust is therefore defined as his presumption that the brand, personified as a character, makes a commitment concerning the fulfillment of his expectations with predictability, and will maintain this orientation with benevolence for a long term. Consequently, trust is seen as a multi-dimensional construct, composed of credibility, integrity and benevolence. Part iii operationalizes and test empirically a structural model specifying the relationships between the different variables. Most of the hypotheses concerning relationships between antecedents, dimensions and outcomes of trust are confirmed. The three dimensions of trust seem to be correlated but clearly distinct constructs. The conclusion points out the limits and theoretical, methodological and managerial contributions made by the research ; suggestions for future research are presented
Adnane, Hassiba Asmaa. « La confiance dans le routage Ad hoc : étude du protocole OLSR ». Phd thesis, Université Rennes 1, 2008. http://tel.archives-ouvertes.fr/tel-00354194.
Texte intégralDans notre travail, nous nous sommes intéressés à la gestion de la confiance (trust management) comme une solution de sécurité pour le protocole OLSR (Optimized Link State Routing Protocol). Cette approche s'adapte particulièrement à la nature mobile, ad-hoc, distribuée et auto-organisée des réseaux ad-hoc. De plus, la gestion explicite de la confiance permet aux entités de raisonner avec et à propos de la confiance, les rendant ainsi plus robustes pour la prise de décisions concernant les autres entités.
Nous commençons par une analyse du fonctionnement du protocole OLSR sous l'optique de la confiance. Ensuite, nous proposons un raisonnement basé sur la confiance pour permettre à chaque noeud d'évaluer le comportement des autres noeuds, de détecter les comportements malveillants, et donc de pouvoir décider de faire confiance ou non. Enfin, nous proposons une solution de prévention et des contremesures pour résoudre le cas d'une incohérence et contrer les comportements malveillants. Ces solutions ne nécessitent que peu de modifications sur le protocole OLSR et peuvent être étendues selon le type d'attaque et les besoins des utilisateurs.
Ben, Amor Haythem. « Le rôle de la confiance dans le management des connaissances : cas des communautés de pratique ». Paris 13, 2007. http://www.theses.fr/2007PA131004.
Texte intégralKnowledge Management (KM) in firms has known a remarkable evolution. The latter’s objective is to resolve various problems such as the “surplus of information”, which characterizes the environment and the employees’ voluntary or forced mobility. Nevertheless, knowledge management does not necessarily imply its success. Indeed, various factors can influence it , notably : culture, leadership, technology, time motivation and especially trust, considering that it constitutes a determining factor of the collective performance, in particular in the case of communities and teams, the production of which is marked by a strong intangible intensity. This research seeks to identify the role of trust in Knowledge Management. The objective is to demonstrate that the success of KM depends largely on the development and preservation of a reliable relation within the concerned actors and between the employees and their organization
Ben, Naoui Jawadi Nabila. « Étude de la contribution du leadership à la gestion de la confiance et de la performance dans les équipes virtuelles ». Paris 9, 2008. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=2008PA090035.
Texte intégralExtension of virtual teams use in workplace as a new approach to organize work raises question about the requisite conditions to their success and efficacy. Our research is interested in leadership and trust identified as key variables in virtual team functioning. We analyse e-leader roles and functions accomplished to build and develop trust in order to reach high performance. Our methodology is based on two empirical studies. The first is qualitative and is based on observation of ten virtual teams composed of three to five members attending on line courses. Data collected from this study is qualitative and consists of 791 electronic mails and 20 interviews with team members. The second is quantitative and is based on the administration of a survey to French virtual team workers. It enables us to collect 213 questionnaires analysed through structural equation model. The results of our study confirm that trust swiftly develops in virtual teams. It is presumed with the constitution of the team and does not follow a cumulative and gradual way to develop. E-leadership roles and functions allowing trust management deal with work coordination, organisation, planning, and control. Facilitating and mentoring roles also contribute to trust management but are less important than the first ones. Virtual team performance is facilitated through trusty relationship associated to dynamic, positive and shared leadership. Our results suggest that virtuality plays a moderating role on virtual team processes. It either reduces or intensifies leadership effect on trust and performance management
Demissie, Yadeta Meseret. « Analyse du nouveau mécanisme de l'OUA pour la prévention, la gestion et le règlement des conflits ». Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape10/PQDD_0020/MQ47191.pdf.
Texte intégralKoning, Jean-Luc. « Un mécanisme de gestion de règles de décision antagonistes pour les systèmes à base de connaissances ». Toulouse 3, 1990. http://www.theses.fr/1990TOU30162.
Texte intégralDeschênes, Emilie. « La construction de relations de confiance au sein des équipes-écoles d’établissements en milieu autochtone du Québec selon les perceptions de leur direction ». Thèse, Université de Sherbrooke, 2016. http://hdl.handle.net/11143/9625.
Texte intégralAbstract : This research studies the dynamic of building trust relationships between actors in schools that are located in Aboriginal communities. This dynamic is studied based-on school administrators’ perceptions, according to their observations of their school team and the environment, their professional practices, their professional and life experiences and the meanings that they attach to them. The study can be considered as a global approach in order to provide a better understanding of the context of school management and school administration in an Aboriginal context. In order to conduct this study in this particular environment, a specific focus lied on the examination of the conditions that lead actors to build or not to build trust with others. On the one hand, the concern of this research relied on the particular Aboriginal context that is characterized by social, cultural, ethno-cultural, economic or administrative issues, where the effective execution of the roles, responsibilities and duties of directors and school administrators appears complex. This complexity particularly concerns the impact of these issues on human relations and personnel management. On the other hand, this study was based on the idea that trust between staff members could have the potential to tinge these relationships. Trust might even be considered as key to optimal education management, to a climate that leads to efficient work, and therefore, to the students’ success. Specific research objectives are the better understanding of the dynamics of trust within school teams at schools located in Aboriginal communities, namely: 1) the analysis of interviews with principals of indigenous schools in light of the conceptual framework; 2) a cross-sectional analysis that allows to determine the conditions that contribute to building trust relationships within their school team; and 3) the proposal of models that suggest various elements that help to understanding the dynamics of building relationships of trust, when seen from different perspectives. These objectives led to the choice of a qualitative research methodology with a constructivist and interpretativist epistemological position. This research is also of an exploratory nature, using semi-structured interviews. Twenty-three principals from seventeen communities and three different Nations were interviewed. The thematic data analysis of the collected material permitted to point out that building trustworthy relationships and modulating relationships of mistrust between actors with heterogeneous characteristics depend on various conditions. Under the influence of the singular Aboriginal context, these conditions that determine how trust relationships are built are anterior to the actors, or associated with their behaviors, attitudes, actions or practices. It seems that these dynamics are context-related to a singular organization of school teams. They can be characterized by determining six categories of individuals, according to their origin and their affiliation or their ethnic identity: indigenous and non-indigenous travelers, indigenous and non-indigenous foreigners and indigenous and non-indigenous natives. Providing a better understanding of this organization leads to a broader conception of the possible configurations of the organizational culture of schools in Aboriginal communities: the configuration of interactional dynamics between individuals and groups (intracommunity dynamic of individuals), and between individuals and communities (intercommunity dynamic of individuals). Specific affiliations exist among those individuals, depending on their identities or on individual or group affiliations. In particular, but non-exclusively, these affiliations are ethnic, linguistic, family, or they are related to particular beliefs.
Chaze, Ludivine. « Performance des relations inter-organisationnelles : impact du co-alignement entre structure, systèmes d’information et confiance dans un contexte industriel ». Grenoble, 2010. http://www.theses.fr/2010GRENG017.
Texte intégralThe inter-organizational relations are often presented as one of the main factors for creating value for businesses. We are interested in this thesis, to improve the performance of RIO by co-alignment of the SSC triptych factors: Structure of RIO, Inter-organizational Information Systems and Trust. Indeed, it appears that the performance of RIO is particularly enhanced when companies succeed in finding the right mix of these factors
Fayad, Fadi. « Gestion de la confiance dans un système de fusion multisensorielle : application à la détection de piétons en situations routières ». Compiègne, 2009. http://www.theses.fr/2009COMP1795.
Texte intégralThis study is a contribution to the advanced driver assistance systems (ADAS), mainly in the domain of road obstacles detection. Using data provided by one or more sensors embarked on a road vehicle, we're trying to identify and track mobile obstacles, thus allowing an automatic assistance which is adapted to the situation. For such data fusion system, the reliability of objects detection and recognition is very important; this is why we propose to manage the confidence in different stages of the process: detection, recognition and tracking. While tracking objects, we propose a technique to update the confidence in detection and recognition using belief functions. Pedestrian detection, which is the heart of the project LOVe (Logiciel d'Observation des Vulnérables), represents a particular case of this study for which a real time embedded system is developed to detect, identify and track pedestrians. The system is integrated in CARMEN, the experimental vehicle of HEUDIASYC laboratory
Augustinova, Maria. « Le potentiel du groupe et sa gestion : quelles implications pour la performance collective et la confiance qu'on lui accorde ? » Paris 5, 2004. http://www.theses.fr/2004PA05H042.
Texte intégralThis dissertation is focused upon effectiveness of groups when faced with reasoning tasks. The hypothesis explored is that whether it is objective or perceived group effectiveness is contingent upon the collective potential and its management during group work. In line with this idea, the first four studies examined conditions that enhance the quality of information sharing during collective problem solving. In contrast to previous research, our results show that, a)group discussion is not sistematically dominated by information that is widely shared ; b) that the efficiency of group information sharing is namely a function of group members' capacity to perceive the information they hold individually as relevant to share. The latter capacity depends upon both the intrinsic properties of information held (Chap. 1 and 2 exp. 2) and also upon the social context in which the information is processed (Chap. 2 & 3). The aim of the last three studies (Chap. 4) was to examine the roots and limits of the heuristics of heterogeneity i. E. A consensual decision taken by a homogeneous group. The results showed that latter effect is moderated by the information about a group's decisional consistency and about the efficiency of information sharing during a group discussion
Grida, Ben Yahia Imen. « Mécanisme de gestion basé sur les principes de l'informatique autonome pour les services de la nouvelle génération ». Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0012.
Texte intégralBaudry, Marie-Josèphe. « Manager donator versus manager oeconomicus : Une étude des relations hiérarchiques au sein d'entreprises, une proposition de formation au management éthique conversation, participation, coopération, don, reconnaissance, confiance. : conversation, participation, coopération, don, reconnaissance, confiance ». Thesis, Tours, 2012. http://www.theses.fr/2012TOUR2009/document.
Texte intégralIn spite of the ambient profiteering, the conviction that an ethical management vouch economic interest, led the author, an experienced manager, assuming a critical attitude, to consider a managerial training preparing the managers with the practice of a such managerial mode. Thus the management, at the same time science and knowledge, at the same time art, deserves and needs, on the one hand the examination of managerial theories, and of the other hand an approach based on notions of social philosophy, such as the notion of responsability, such us the gift-paradigm according to Mauss, coupled with the notion of recognition (this pair defined by Caillé), notion developed by Honneth in addition, this recognition revealed sometimes in the appearence of confidence. The study of ordinary relationships in the managerial links, between employees or individual contributors and managers, indicates divergences and convergences between the practice of managers and the wishes of employees
Boughzala, Younès. « Le rôle de la confiance dans l'adoption des systèmes d'information : cas de l'e-achat public en France ». Université Savoie Mont Blanc, 2010. http://www.theses.fr/2010CHAML012.
Texte intégralThe purpose of this research is to study the factors that determine individual adoption of electronic procurement tools and the role that trust can play. To detect and analyze the determinants of adoption and explore the place of trust, this research brings together the contributions of a qualitative exploratory approach with those of a confirmatory quantitative study. This research, trough the implementation of several collection methods and statistical analysis, identified factors that determine adoption of electronic tools for government purchase both by public purchasers and private companies. This adoption behavior is affected by several factors that relate to the technology, to the individual and to the organizational context (cultural, social, etc. . . ). This research has also shown that trust is fundamental and can come in several aspects, namely self-confidence, trust in technology, trust in partners and in organization. The analysis with structural modeling shows that technology adoption is the result of its technical and functional characteristics, the confidence level of the user towards the interaction with this technology, and the monitoring provided
Hadjipavlou, Elena. « Big data, surveillance et confiance : la question de la traçabilité dans le milieu aéroportuaire ». Thesis, Université Côte d'Azur (ComUE), 2016. http://www.theses.fr/2016AZUR2044/document.
Texte intégralThis research project questions, in a comprehensive and critical way, the presence of digital traces in the era of Big Data. This reflection opens up in the relation between Surveillance and Trust. In recent years, “Big Data” has massively and repeatedly been used in order to describe a new societal dynamic that would be characterized by the production of massive quantities of data. Furthermore, enormous potential benefits from using new statistical tools to analyze these data generated from connected objects and tools in more and more human actions. The airport sector is currently facing a major transformation, fueled by the explosion of data within its structure. The data generated during a passenger's journey are now extremely massive. There is no doubt that the management of this data is an important lever for the safety, the improvement of services and the comfort of the passenger. However, the expected benefits raise a great question: Where do these data go? We do not know. And as long as we do not know, how can we trust? These considerations are being examined at Larnaca airport in Cyprus. The different angles of approach as well as the diversity of the actors required the creation of a multidimensional corpus, resulting from a mixed methodology, in order to have a comprehensive approach to the subject. This corpus includes interviews, questionnaires and life stories of passengers and professionals. The qualitative and quantitative analysis that followed was based on a theoretical framework previously elaborated, in order to cross the representations of the actors concerning the surveillance and the trust and finally, highlight the different inherent visions to this issue
Demir, Levent. « Module de confiance pour externalisation de données dans le Cloud ». Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM083/document.
Texte intégralData outsourcing to the Cloud has led to new security threats. The main concerns of this thesis are to protect the user data and privacy. In particular, it follows two principles : to decrease the necessary amount of trust towards the Cloud, and to design an architecture based on a trusted module between the Cloud and the clients. Both principles are derived from a new design approach : "Trust The Module, Not The Cloud ".Gathering all the cryptographic operations in a dedicated module allows several advantages : a liberation from internal and external attacks on client side ; the limitation of software to the essential needs offers a better control of the system ; using co-processors for cryptographic operations leads to higher performance.The thesis work is structured into three main sections. In the first section , we confront challenges of a personal Cloud, designed to protect the users’ data and based on a common and cheap single-board computer. The architecture relies on two main foundations : a transparent encryption scheme based on Full Disk Encryption (FDE), initially used for local encryption (e.g., hard disks), and a transparent distribution method that works through iSCSI network protocol in order to outsource containers in Cloud.In the second section we deal with the performance issue related to FDE. By analysing the XTS-AES mode of encryption, the Linux kernel module dm-crypt and the cryptographic co-processors, we introduce a new approach called extReq which extends the cryptographic requests sent to the co-processors. This optimisation has doubled the encryption and decryption throughput.In the final third section we establish a Cloud for enterprises based on a more powerful and certified Hardware Security Module (HSM) which is dedicated to data encryption and keys protection. Based on the TTM architecture, we added "on-the-shelf" features to provide a solution for enterprise
Simard, Claudine. « La participation des travailleurs à une recherche en santé mentale au travail : une histoire de confiance ». Thesis, Université Laval, 2009. http://www.theses.ulaval.ca/2009/26138/26138.pdf.
Texte intégralSmaoui, Chabchoub Aida. « Excès de confiance et optimisme des dirigeants : cas des firmes initiatrices d'une acquisition ». Thesis, Montpellier 2, 2010. http://www.theses.fr/2010MON20205.
Texte intégralThe introduction of the behavioral dimension in the explanation of the phenomena of mergers and acquisitions has allowed to replace the traditional assumptions of rationality of the participants by potentially more realistic behavioral assumptions. Behavioral corporate finance allows to treat the phenomenon of mergers and acquisitions in a framework widened, incorporating into the analysis the hypothesis of the irrationality of participants in particular the managers of bidders. The present work focuses on studying the relationship between the behavioural bias of managers of bidders such as overconfidence bias, and the operations of acquisition. Firstly, we develop several measures of CEO overconfidence. Secondly, these measures are used to study the effect of overconfidence on acquisitions policies. From a sample of French firms involved in operations of acquisitions during the period 1999-2007, we show that the overconfident CEO tend to make more acquisitions and to make them with a higher acquisition premium. However, these acquisitions are unprofitable for the shareholders of the bidders since the returns realized are negative around the date of announcement
Rocher, Laurence. « Gouverner les déchets. Gestion territoriale des déchets ménagers et participation publique ». Phd thesis, Université François Rabelais - Tours, 2006. http://tel.archives-ouvertes.fr/tel-00175228.
Texte intégralLa recherche porte sur les dispositifs à caractère participatif spécifiques à la politique française de gestion des déchets. Elle vise à interroger la capacité de ces procédures -considérées comme instruments d'action publique- à accompagner la gestion territorialisée des déchets. Mobilisant des outils propres à l'analyse des politiques publiques, elle s'attache à comprendre tant la fabrique institutionnelle de dispositifs visant à optimiser l'acceptation des équipements de traitement des déchets que leur mise en œuvre territorialisée, à partir d'une réflexion organisée en trois temps.
Un travail d'analyse de la politique française de gestion des déchets (1975-2005) fait apparaître comment les conflits d'implantation sont devenus le problème central de la gestion des déchets, et la restauration d'un sentiment de confiance une priorité pour les décideurs. L'analyse est articulée autour de trois entrées : l'identification des instruments d'action publique utilisés, la construction progressive d'un public-cible multiforme, le cadre territorial.
En écho à l'analyse de la politique au niveau national, une seconde partie propose une analyse menée dans un contexte local. L'étude du processus de la planification en Indre-et-Loire et du conflit lié au projet d'un incinérateur permet de mettre en évidence dans quelle mesure s'est opérée une réouverture du « problème déchets » dans un contexte de crise, et de comprendre l'utilisation des instruments participatifs. Une mise en perspective avec le cas de Montréal (Québec) apporte un éclairage intéressant, notamment en matière de consultation publique et d'organisation territoriale.
Une troisième partie est consacrée aux Commissions locales d'information et de surveillance (CLIS), en tant qu'outils emblématiques de la conflictualité des déchets. A la suite d'une réflexion sur la construction institutionnelle de ces dispositifs, une observation empirique rend compte de leur mise en œuvre en région Centre.
Duan, Mingming. « Incomplétude des contrats et relations inter-firmes dans une économie en transition : le cas de la Chine ». Paris 10, 2007. http://www.theses.fr/2007PA100209.
Texte intégralThis research is a study of the role of the contract in inter-firm relations in transitional economies like China. As the first institutional tool for the organisation of modem economies, could or can contracts "modernise" relations between Chinese businesses in the sense that it could institutionalise them ? Based on empirical analyses about the way Chinese agents (enterprises) manage incompleteness of contracts, this study aims to illustrate their conception of cooperation. The results of field studies showed that the prevailing use of contracts in Chinese enterprises' transactions had few effects on the institutionalisation of their economic life : it is strongly embedded in the agents' personal social relations and is not organised according to bureaucratic capitalist logic. All this can be explained by the absence of what we call "contract spirit" in Chinese culture, and this absence may have a historical basis. This "cultural incompleteness" probably plays a more determinant role thon other forma of contract incompleteness (cognitive and economic) in Chinese agents' contractual practices. The challenge for both managers and policy makers will be to take into account this great "cultural incompleteness of contracts" in order to better use social relations with more realism in the organisation of economic activities (instead of trying to neutralise them) so that these relations serve more as a transaction cost-saving device thon a transaction cost-producer
Lelis, Dimitri. « Le mécanisme d'exploitation des connaissances d'un système d'aide à la décision : application à la gestion des ressources en eau ». Grenoble 2, 1989. http://www.theses.fr/1989GRE21025.
Texte intégralOur work concerns the modelisation of economic planning. We are particularly interested in deciding how to choose the actions that must be executed in a given situation of a socio-economical system. One can decide without the necessity of utility functions if one has available the necessary data. Our work concerns the conception and the realisation of a system which helps to find this data. The model applied is of life-size scale. We examine the notions of intelligence, determinism as well as indeterminisme. We expose the principles of the two major families of decision support systems : the first one whereby optimisation is given priority and the second one which is characterised by the simple management of data. We examine the relation between modelisation in economy and automated economical models. During modelisation we have followed the relational analysis. We explain a domain-expert's of the socioeconomical system due yo water and we define the functional specifications of the system. We present the logical structure of data which describes a socio-economical system as well as the expert-systems approach and we include a brief critical study in which their inefficiency concerning knowledge exploitation is brought out. Our main contribution is the compilation of data. The technics used are those of graph exploration which avoid the combinatorial explosion. Finally, we describe how these technics ensure the functional specifications of an economical model
Cailliere, Romain. « Mécanismes de négociation distribuée pour la gestion intelligente de l’énergie ». Thesis, Lyon, 2017. http://www.theses.fr/2017LYSE1141/document.
Texte intégralIncreasing needs in energy, and earth pollution, coming from the use of polluting and non-renewable energy, make it indispensable the design of new energetic models, sustainable and reliable. Today, these new models are based on a massive integration of renewable generators in the grid. The renewable integration issues come from their stochastic features, depending on the weather conditions, most of the time. The coming of new information and communication technologies allows the integration of an information layer to the energy grid allowing it to be smarter and allow to have a glimpse of the possibility of a decentralised management of renewable energy. These energy being mainly decentralised, unlike imposing nuclear, coal and gas power plants, are produced directly at the customer's location. Consumers become, then, a prosumer able to answer to its own energetic needs,and maybe to act as a producer if it produces more energy than it consumes. But, the coming of a plethora of small actors, able to buy and sell energy, in real time, in a market containing the more powerful actors, traditional in the market, can be a source of volatility for energy prices. Considerable variations of the price can lead to detrimental situations by disturbing the grid. To face this problem, we developed a first mechanism for automatic negotiations, on three time scales, which decrees constraints on demand and on prices in order to guarantee their stability. This mechanism rely on representative entities (producers, prosumers and aggregators) to manage demand and supply without taking into account the impact on the grid of the negotiated contracts between these entities. The second mechanism, based on blockchain technology, allows bilateral decentralised negotiations and take into account the physical impacts on the grid of each energy exchange between prosumers, guaranteing then, the grid integrity. The proposed mechanism exempt itself from a management of the grid stability from a centralised third part
Ould, Cheik El Mehdi Saadbouh. « Un nouveau mécanisme de gestion de flux temps réel basé sur le paramètre échéance et son intégration dans l' Internet ». Paris 13, 2007. http://www.theses.fr/2007PA132004.
Texte intégralXu, Xiaozhou. « Mécanisme de collaboration dans la collaboration logistique horizontale ». Phd thesis, Ecole Nationale Supérieure des Mines de Paris, 2013. http://pastel.archives-ouvertes.fr/pastel-00957302.
Texte intégralVan, Den Berg Cindy. « Quels leviers pour une collaboration efficace ? : le rôle de la confiance et de la culture : le cas de la fusion-acquisition entre Air-France et KLM ». Thesis, Paris 1, 2016. http://www.theses.fr/2016PA01E006.
Texte intégralMerger-acquisition is the most widespread mode of external development for dealing with the changing environment of business (Jacob and Poitras, 2015). The main objective of a merger-acquisition is most often seeking for synergies. However, in order to achieve the objectives of the new entity, individuals must work together to create collective efficiency that adds value to the work they realize (Morin, 2015). Nevertheless, we find no studies in the scientific literature on how to promote effective inter-individual collaboration after a merger-acquisition.This PhD proposes a research model integrating the various determinants of collaboration and pays particular attention to the extent of the influence of trust and culture that play, according to the existing literature, an important role in the effectiveness of inter-individual collaboration. The results of a qualitative study, based on 44 interviews, and a quantitative study, based on 301 questionnaires, that are both realized at Air France-KLM, allow us to see that trust and culture have an important and indirect influence on the effectiveness of collaboration.Our study confirms firstly the importance of studying inter-individual collaboration by showing that its effectiveness determines 68% of the realization of the objectives of the organization. Secondly, we observe that trust is essential for good communication and strong social cohesion, which in turn account for 58% of the effectiveness of collaboration. Thus, we remark that interpersonal trust influences the effectiveness of collaboration indirectly. This is also the case for culture. Power distances in corporate culture and avoidance of uncertainty in national culture have a negative impact on trust and social cohesion. Since social cohesion and communication determine the effectiveness of collaboration, we could conclude that cultural aspects influence the effectiveness of collaboration indirectly
Destoup, Aurélie. « Le management de la créativité dans les entreprises : étude comparative du management de la créativité dans deux entreprises du multimédia ». Montpellier 3, 2008. http://www.theses.fr/2008MON30067.
Texte intégralCreativity is often confused with innovation. Creativity and innovation involve two different processes each having different objectives and ways of reaching them. Creativity is a process during which a person or a group of people draw upon their skills, resources and knowledge to conceive, develope and exploit ideas to develop new products, processes or services. Which are unexpected in a given organisational framework. At this present moment in time, faced with the globalisation of markets and the ever increasing competitiveness of companies. , creativity is becoming an essential condition of survival. However, it seems that the importance given to creativity in companoes is, to say the least, inadaquate or even inexistant. Indeed, creativity in companies is often confused with innovation. This comes back to the fact that it isn’t managed at all. The aim of this thesis is to clarify what we understand by someone’s creativity in a company and to identify the key varaibles with regards to how it’s managed. We shall address the following questions. What are the factors which help foster someone’s creativity in a company? How is creatiivity mananged in companies? In order to answer these questions, we have carried out several case studes based on field research conducted in a multimedia environment. Our study is based on a descriptive analyses which compares the creative processes in two Multimedia companies, supported by an analyses of the data. The thesis takes into account the factors which enhance creativity and also those which inhibit it. In a professional environment. It will also show how the management of creativity is conditionioned by human will
Tan, Heng Chuan. « Vers des communications de confiance et sécurisées dans un environnement véhiculaire ». Thesis, Paris, ENST, 2017. http://www.theses.fr/2017ENST0063/document.
Texte intégralRouting and key management are the biggest challenges in vehicular networks. Inappropriate routing behaviour may affect the effectiveness of communications and affect the delivery of safety-related applications. On the other hand, key management, especially due to the use of PKI certificate management, can lead to high latency, which may not be suitable for many time-critical applications. For this reason, we propose two trust models to assist the routing protocol in selecting a secure end-to-end path for forwarding. The first model focusses on detecting selfish nodes, including reputation-based attacks, designed to compromise the “true” reputation of a node. The second model is intended to detect forwarders that modify the contents of a packet before retransmission. In key management, we have developed a Secure and Authentication Key Management Protocol (SA-KMP) scheme that uses symmetric cryptography to protect communication, including eliminating certificates during communication to reduce PKI-related delays
Tan, Heng Chuan. « Vers des communications de confiance et sécurisées dans un environnement véhiculaire ». Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0063.
Texte intégralRouting and key management are the biggest challenges in vehicular networks. Inappropriate routing behaviour may affect the effectiveness of communications and affect the delivery of safety-related applications. On the other hand, key management, especially due to the use of PKI certificate management, can lead to high latency, which may not be suitable for many time-critical applications. For this reason, we propose two trust models to assist the routing protocol in selecting a secure end-to-end path for forwarding. The first model focusses on detecting selfish nodes, including reputation-based attacks, designed to compromise the “true” reputation of a node. The second model is intended to detect forwarders that modify the contents of a packet before retransmission. In key management, we have developed a Secure and Authentication Key Management Protocol (SA-KMP) scheme that uses symmetric cryptography to protect communication, including eliminating certificates during communication to reduce PKI-related delays