Tesi sul tema "Protection de données"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Protection de données".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Dang, Thi Thu Thao. "La protection des données personnelles". Paris 2, 2009. http://www.theses.fr/2009PA020010.
Testo completoMunoz, Martine. "La protection des échanges de données informatisées". Nice, 1997. http://www.theses.fr/1997NICE0045.
Testo completoCoudray, Ludovic. "La protection des données personnelles dans l'Union européenne". Paris 2, 2005. http://www.theses.fr/2005PA020094.
Testo completoCutillo, Leucio Antonio. "Protection des données privées dans les réseaux sociaux". Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00932360.
Testo completoCutillo, Leucio Antonio. "Protection des données privées dans les réseaux sociaux". Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0020.
Testo completoOnline Social Network (OSN) applications allow users of all ages and educational background to easily share a wide range of personal information with a theoretically unlimited number of partners. This advantage comes at the cost of increased security and privacy exposures for users, since in all existing OSN applications, to underpin a promising business model, users' data is collected and stored permanently at the databases of the service provider, which potentially becomes a “Big Brother” capable of exploiting this data in many ways that can violate the privacy of individual users or user groups. This thesis suggests and validates a new approach to tackle these security and privacy problems. In order to ensure users' privacy in the face of potential privacy violations by the provider, the suggested approach adopts a distributed architecture relying on cooperation among a number of independent parties that are also the users of the online social network application. The second strong point of the suggested approach is to capitalize on the trust relationships that are part of social networks in real life in order to cope with the problem of building trusted and privacy-preserving mechanisms as part of the online application. Based on these main design principles, a new distributed Online Social Network, namely Safebook, is proposed: Safebook leverages on real life trust and allows users to maintain the control on the access and the usage of their own data. The prototype of Safebook is available at www.safebook.eu
Benzine, Mehdi. "Combinaison sécurisée des données publiques et sensibles dans les bases de données". Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0024.
Testo completoProtection of sensitive data is a major issue in the databases field. Many software and hardware solutions have been designed to protect data when stored and during query processing. Moreover, it is also necessary to provide a secure manner to combine sensitive data with public data. To achieve this goal, we designed a new storage and processing architecture. Our solution combines a main server that stores public data and a secure server dedicated to the storage and processing of sensitive data. The secure server is a hardware token which is basically a combination of (i) a secured microcontroller and (ii) a large external NAND Flash memory. The queries which combine public and sensitive data are split in two sub queries, the first one deals with the public data, the second one deals with the sensitive data. Each sub query is processed on the server storing the corresponding data. Finally, the data obtained by the computation of the sub query on public data is sent to the secure server to be mixed with the result of the computation on sensitive data. For security reasons, the final result is built on the secure server. This architecture resolves the security problems, because all the computations dealing with sensitive data are done by the secure server, but brings performance problems (few RAM, asymmetric cost of read/write operations. . . ). These problems will be solved by different strategies of query optimization
Jacob, Stéphane. "Protection cryptographique des bases de données : conception et cryptanalyse". Phd thesis, Université Pierre et Marie Curie - Paris VI, 2012. http://tel.archives-ouvertes.fr/tel-00738272.
Testo completoLefèvre, Pascal. "Protection des contenus multimédias pour la certification des données". Thesis, Poitiers, 2018. http://www.theses.fr/2018POIT2273/document.
Testo completoFor more than twenty years, technology has become more and more easy to access. It is omnipresent in everyday life and is low cost. It allows anyone using a computer or a smartphone to visualize and modify digital contents. Also, with the impressive progress of online massive data storage (cloud), the quantity of digital contents has soared and continues to increase. To ensure the protection of intellectual property and copyright, knowing if an image has been modified or not is an important information in order to authenticate it. One approach to protect digital contents is digital watermarking. It consists in modifying an image to embed an invisible mark which can authenticate the image. In this doctorate thesis, we first study how to improve the robustness of digital image watermarking against image processings thanks to error correcting codes. By studying the error structure produced by the image processing applied on a watermarked image, we can find an optimal choice of error correcting code for the best correction performances. Also, we propose to integrate a new type of error correcting codes called rank metric codes for watermarking applications. Then, we propose to improve the invisibility of color image watermarking methods. At the embedding step, a host image suffers some distortions which are perceived differently in function of the color by the human visual system. We propose a biological model of color perception which allows one to minimize psychovisual distortions applied on the image to protect
Hadmi, Azhar. "Protection des données visuelles : analyse des fonctions de hachage perceptuel". Thesis, Montpellier 2, 2012. http://www.theses.fr/2012MON20159/document.
Testo completoThe widespread use of multimedia technology has made it relatively easy to manipulate and tamper visual data. In particular, digital image processing and image manipulation tools offer facilities to intentionally alter image content without leaving perceptual traces. This presents a serious problem, particularly if the authenticity of the digital image is required. The image authentication should be based on their visual content and not on their binary content. Therefore, to authenticate an image, some acceptable manipulations that could undergoes an image, such as JPEG compression and Gaussian noise addition, must tolerated. Indeed, these manipulations preserve the visual appearance of the image. At the same time a perceptual hashing system should be sufficiently sensitive to detect malicious manipulations that modify the interpretation of the semantic content of the imagesuch as adding new objects, deleting or major modification of existing objects.In this thesis, we focus on perceptual hash functions for authentication and integrityverification of digital images. For this purpose, we present all aspects of perceptual hashfunctions. Then, we discuss the constraints that perceptual hashing system must satisfy tomeet desired level of robustness of perceptual signatures. Finally, we present a method toimprove the robustness and security of a system of perceptual hashing
Leukam, Lako Franklin. "Protection des données à caractère personnel pour les services énergétiques". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS004.
Testo completoSmart grids are important bricks in the fight against climate change. Smart grids allow the massive introduction of renewable energies, which are intermittent, while guaranteeing grid stability, i.e., ensuring a real-time balance between demand and production in the power grid. The management of grid stability is possible thanks to smart meters installed in households, allowing the distribution system operator to collect consumption/production data from consumers/producers at a time step of up to 10 min in France. This real-time consumption data enables to provide new energy services, such as customer consumption forecasts or demand response. Demand response services help to avoid consumption peaks in a neighborhood by ensuring that, at all times, users' consumption does not exceed the maximum power of the local grid. However, the collection of users' consumptions is a key privacy concern. Indeed, individual consumption data reflect the use of all electric appliances by inhabitants in a household over time, and enable to deduce the behaviors, activities, age or preferences of the inhabitants. This thesis aims to propose new energy services, while protecting the privacy of consumers. We propose five contributions that relate to two themes:1- The transformation of a demand response algorithm by making it privacy friendly. This transformation uses secure multiparty computation, allowing to compute an aggregate, such as a sum of users’ consumption, without disclosing any individual consumption.2- The publication of sum of users' consumption while preserving privacy and good utility. This publication uses differential privacy, ensuring that the publication of the sum does not indirectly reveal individual users' consumption. Among other energy services, these sums of consumption enable to perform consumption forecasts
Dari, Bekara Kheira. "Protection des données personnelles côté utilisateur dans le e-commerce". Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00923175.
Testo completoDari, Bekara Kheira. "Protection des données personnelles côté utilisateur dans le e-commerce". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2012. http://www.theses.fr/2012TELE0045.
Testo completoInformatics and Internet in particular favor largely the collection of data without user permission, their disclosure to third parties and their cross-analysis. The density of the human activities in the digital world thus constitutes a fertile ground for potential invasions of privacy of the users. Our works examine first the legal context of privacy protection, as well as the diverse computing means intended for the protection of personal data. A need for user centered solutions emerges, giving him/her more control over his/her personal data. In this perspective, we analyze European and French privacy legislation to extract data protection axis. Then we specify the constraints related to these axes, and we introduce them in existing security policy models. Thus we suggest the application of one model for both access control and privacy protection. The access control model should be extended by new privacy related conditions and parameters. To do so, we define the language XPACML (eXtensible Privacy aware Access Control Markup Language) based on XACML and new privacy extensions. Placed in an E-commerce context, we define a semantic model allowing to represent various electronic transactions contexts, and leading to a dynamic generation of context- aware XPACML policies. Looking for a vast protection of the personal data, we dedicate the last part of our works to the possible negotiations which can be made between a user and a service provider. Two protocols are proposed. The first one permits the negotiation of the terms and the conditions of data protection policies, while the second permits the negotiation of the requested data themselves
Riaud, Stéphanie. "Obfuscation de données pour la protection de programmes contre l'analyse dynamique". Thesis, Rennes 1, 2015. http://www.theses.fr/2015REN1S167.
Testo completoReverse engineering is a technique that consists in analyzing a product in order to extract a secret. When a computer program is targeted, the reverse engineer may seek to extract an algorithm code or any component of this program. Obfuscation is a protection technique aimed to make it more difficult to reverse engineer. We are interested in the study and development of obfuscation techniques to protect computer programs. We have developed a new technique of code obfuscation, then we have demonstrated its effectiveness, and finally we implemented another protection technique with the aim of enhance the resilience of anti-reverse engineering protection techniques. So we, initially, designed and implemented a new obfuscation technique to protect certain specific elements contained in the programs implemented in C language. By relying on dynamic analysis techniques, we have established the effectiveness of this protection technique. Secondly, we have backed up previously established elements, by demonstrating empirically that this protection can be applied to concrete programs. We demonstrate that this protection can be placed on high-level codes and remain effective on executable files obtained from these codes. We demonstrate that when the process of obfuscation is realized in a scrupulous way, the execution time of programs remains in the same order as that of the protected programs. Thirdly, we work on developing targeted protection mechanisms to counter automatic analysis tools used by reverse engineers. Their aim is to enhance the robustness of the techniques applied to high level by increasing their stealth and providing fake results for the reverse engineers. Our contributions cover various topics related to protection against reverse engineering. We have developed and implemented new code protection techniques. When these protection techniques are apply to high level, we have developed a process to demonstrate that they do not lose efficiency and their cost in terms of execution time remains acceptable. For the lowest level protection techniques that we have developed, we have demonstrated their effectiveness face of dynamic code analysis tools used in reverse engineering
Marliac-Négrier, Claire. "La protection des données nominatives informatiques en matière de recherche médicale". Clermont-Ferrand 1, 1999. http://www.theses.fr/1999CLF10211.
Testo completoThe protection of named personal information, direct or indirect, was the object of a passionate debate in France during the 70’s, as information technology advanced, and in so doing exposed devious and aberrant practices. This led to the adoption of the law 6th January 1978 called “Informatique et libertés”. If information technology has allowed uncontestable progress in the treatment and stockage of personal information. The health services, in particular have invested heavily in this technology, especially in research and development, and here the information is particularly sensitive. What are the protections and are they sufficient? There is the problem. The law of 1978 was amended by the law 1st July 1994 so as so legally allow the communication of specific medical information, normally covered by the medical secret, to researchers. It appears that the legislation is insufficient and that this will become even more apparent with the application of the European directive n° 95/46 relative to the protection of the individual with regards to personal information and its free circulation. We propose the solutions reconciling the necessity of medical research and the protection of the individual, by valorizing an active role for the individual concerned
Seitz, Ludwig. "Conception et mise en oeuvre de mécanismes sécurisés d'échange de données confidentielles : application à la gestion de données biomédicales dans le cadre d'architectures de grilles de calcul / données". Lyon, INSA, 2005. http://theses.insa-lyon.fr/publication/2005ISAL0055/these.pdf.
Testo completoGrid computing allows users to share multiple heterogeneous resources, such as computing power, storage capacity and data, and provides an architecture for transparent interoperation of these resources from the user's point of view. An upcoming application for Grids is health-care. More than for the first applications of Grids (e. G. Particle physics, terrestrial observation), security is a major issue for medical applications. Conventional data protection mechanisms are only of limited use, due to the novel security challenges posed by Grids. To respond to these challenges we propose an access control system that is decentralized and where the owners of some data are in control of the permissions concerning their data. Furthermore data may be needed at very short notice, the access control system must support a delegation of rights that is effective immediately. Grid users also need delegation mechanisms to give rights to processes, that act on their behalf. As these processes may spawn sub processes, multi-step delegation must be possible. In addition to these usability requirements, the transparent storage and replication mechanisms of Grids make it necessary to implement additional protection mechanisms for confidential data. Access control can be circumvented by attackers having access to the physical storage medium. We therefore need encrypted storage mechanisms to enhance the protection of data stored on a Grid. In this thesis we propose a comprehensive architecture for the protection of confidential data on Grids. This architecture includes an access control system and an encrypted storage scheme
Faria, Maria Paula Marçal Grilo Lobato de. "Données génétiques informatisées : un nouveau défi à la protection du droit à la confidentialité des données personnelles de santé". Bordeaux 4, 1996. http://www.theses.fr/1996BOR40030.
Testo completoAfter a description of the dangers posed to human privacy by "new genetics" and informatics, this thesis leads to the conclusion, by means of an analysis of the portuguese juridical framework, in a compared law perspective, of the right to confidentiality, medical secrecy and personal data protection laws, that contemporary law needs a special legal statute to rule the confidentiality of personal health genetic data without which fundamental human rights will be in threat
Jarma, Yesid. "Protection de ressources dans des centres de données d'entreprise : architectures et protocoles". Phd thesis, Université Pierre et Marie Curie - Paris VI, 2012. http://tel.archives-ouvertes.fr/tel-00666232.
Testo completoLanna, Maximilien. "La protection des données à caractère personnel à l’épreuve de l’automesure connectée". Thesis, Paris 2, 2019. http://www.theses.fr/2019PA020026.
Testo completoPersonal data protection law is today at a turning point : its core principles are weakened by self-tracking technologies, thus reducing protection of individuals. In order to determine how new technologies affect the law, this study aims to figure ou the paradigm shift that has been implemented by the new RGPD and its consequences on personal data protection
Bouslimi, Dalel. "Protection de données d'imagerie par tatouage et chiffrement - Application à la télémédecine". Télécom Bretagne, 2013. http://www.telecom-bretagne.eu/publications/publication.php?idpublication=11987.
Testo completoThe rapid evolution of multimedia and communication technologies offers new means of sharing and remote access to patient data (e. G. Telemedicine applications). At the same time, security issues are increased, but not only. Indeed, in telemedicine application frameworks, there is a need to ensure the confidentiality and the reliability (integrity and authenticity) of exchanged images, but also to provide evidence that an exchange took place, particularly in case of litigation. This Ph. D. Thesis focuses on these issues. Our first contribution relates to a new telemedicine protocol based on watermarking and cryptographic mechanisms, which allows bringing out those evidences and identifying which data were exchanged. Our protocol is resistant to different types of attacks (e. G. Non-repudiation issue, collusion attack). This protocol is quite general and can be used with different encryption and watermarking algorithms. Nevertheless, the question arises as to which combination offers the best flexibility/efficiency in terms of security objectives. The answer to this question constitutes the second research axis of this Ph. D. Thesis work. So, on a more practical level, it started by focusing on Joint Watermarking/Encryption (JWE) methods, and has recently culminated in an approach of data hiding of encrypted images (DHE). In both cases, our objective is to ensure an a priori (by encryption) and a posteriori (by watermarking) protection of images; a protection that is appropriate to the previously developed protocol. With those solutions, the embedded pieces of information, a set of security attributes, are available in both the encrypted domain and the spatial domain, i. E. After decryption process. These attributes can be used for verifying the image reliability even though it is encrypted. The two solutions JWE and DHE introduce very low image degradation while providing an enough capacity to embed a reliability proof as well as some other data. The first solution has also been developed to be compliant with the DICOM standard due to the fact that it merges the AES encryption algorithm with the watermarking Quantization Index Modulation (QIM). Our second technique allows us to save computational time because it is not necessary to decrypt the image for watermarking it, and to ensure confidentiality protection without discontinuity
Dupouy, Sabrina. "La prise en compte des données environnementales par le contrat". Thesis, Aix-Marseille, 2016. http://www.theses.fr/2016AIXM1068.
Testo completoThe notion of environment embraces the “natural and artificial living environment of man” which means “the living space” of the human being. Today the quality of this environment takes on an increasing importance in the legal order. Environmental law, which follows the purposes of environmental protection and protection of the human being, is now investing private law. In particular, contract law seems significantly affected by the level of requirement of environmental quality. In this context, what is the role of a contract in front of growing contemporary concerns regarding environmental quality ? It seems that the environment is comprehended by the contract as an ambivalent element. On the one hand it is indeed a risk against which it is necessary to protect the contracting party and, on the other hand, a value that can be directly protected by the contract. The contract is subsequently without doubt shaped by the parties themselves, as well as by the judge and the legislator to protect the contracting party against environmental risks and to contribute to environmental protection
Rossi, Julien. "Protection des données personnelles et droit à la vie privée : enquête sur la notion controversée de « donnée à caractère personnel »". Thesis, Compiègne, 2020. http://www.theses.fr/2020COMP2549.
Testo completoInternet and digital information and communication technologies in general are often portrayedas a threat to privacy. This gives rise to many debates, both in the media and among decisionmakers. The Snowden revelations, in 2013, followed by the adoption in 2016 of the General Data Protection Regulation (GDPR), have moved these discussions under the spotlight of the publicsphere.The research presented in this dissertation was born out of three questions: can we define what“privacy” is? Is there any consensus on its definition? And does this consensus change with theevolution of the technical milieu transforming our ways of communicating, and by doing so, theway in which our privacy can be intruded upon? By defining “privacy” as the object which is protected by normative texts – laws, court decisions,techno-political standards of the Internet – protecting the right to privacy, it becomes possible toconduct an empirical study of how it evolved and how it has been a topic of contention. Data protection law emerged in Europe during the 1970’s. Its aim was to protect a “privacy” that was perceived as under threat by the advent of computers. Currently, the GDPR, or somedocuments adopted by standards-settings organisations like the Internet Engineering Task Force(IETF) or the World Wide Web Consortium (W3C), are written with the intention that they protect this privacy through a set of rules and principles referred to as “data protection”, that apply to “personal data”. The legal definitions of this notion produced by political institutions and those crafted instandards-settings bodies are identical. Furthermore, the study of the genealogy of data protection reveals that computer scientists have played a pivotal role in the invention of the principles that “data protection” still relies on, for instance in the GDPR. The analysis of the controversies that took place in the shaping of these rules shows that the notion of “personal data” written down in the normative texts we analysed essentially reflects the beliefs system of a coalition inspired by liberal utilitarian ideals, valuing individual autonomy and granting importance to the respect of one’s consent. This framing of “privacy” has become the paradigm on the field. Other theories, such as those defining “privacy” as a space bound by collectively defined borders protecting it from the public eye, or those advocating the recognition of private property rights on personal data, have been less successful in shaping policy out comes.The advent and spread of networked computers have not directly determined the evolution of theobject that is protected by the right to privacy. It is, rather, the perceptions a group of actors had of computers, that caused such an evolution. Convinced that their liberal conception of privacy issocially valuable, they managed to craft a new legal category during the 1970’s in Europe: the right to the protection of personal data. The GDPR, adopted in 2016, just like Web standards aiming at enhancing the protection of privacy, rely those same principles that were invented during these early debates. Therefore, it can be said that the emergence of computers has indeed, but indirectly, been a triggering factor in the evolution of “privacy” defined as the object protected by the right to privacy
Teresi, Laurent. "La commercialisation des données publiques". Aix-Marseille 3, 2007. http://www.theses.fr/2007AIX32070.
Testo completoMedjdoub, Saïda. "Modèle de contrôle d'accès pour XML : application à la protection des données personnelles". Phd thesis, Université de Versailles-Saint Quentin en Yvelines, 2005. http://tel.archives-ouvertes.fr/tel-00340647.
Testo completoLa mise en place de DMP auprès d'un hébergeur de données de santé pose des problèmes de confidentialité. En effet, l'hébergeur peut se révéler non fiable. Pour cette raison, nous avons étudié, également, des solutions pour sécuriser le partage des données sur des infrastructures non sûres.
Malekian, Hajar. "La libre circulation et la protection des données à caractère personnel sur Internet". Thesis, Paris 2, 2017. http://www.theses.fr/2017PA020050.
Testo completoFree flow of data and personal data protection on the Internet Protection of personal data is an autonomous fundamental right within the European Union (Article 8 of the Charter of Fundamental Rights of European Union). Moreover, free flow of personal data and free movement of information society services in particular online platforms is essential for the development of digital single market in European Union. The balance between free movement of data and personal data protection is subject of the European legal framework. However, the main challenge still remains to strike the right balance between effective personal data protection and free flow of this data and information society services. This balance is not an easy task especially in the age of online platforms, Big Data and processing algorithms like Machine Learning and Deep Learning
Van, Outryve D'Ydewalle Sibylle. "Protection de la vie privée a l'égard du traitement automatisé des données personnelles". Thesis, McGill University, 1997. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=20226.
Testo completoTassone, Loredana. "La protection européenne des données à caractère personnel traitées à des fins judiciaires". Thesis, Strasbourg, 2013. http://www.theses.fr/2013STRAA028.
Testo completoIn our society which can be called "information society" and also society of "electronic surveillance," it is essential to ensure the protection of personal data. The implementation of regulations on data protection has not always been easy, and in some areas, remains complex. The judiciary is a striking example of an area where it has been difficult to establish specificand appropriate rules for the protection of personal data. In the years ninety, the question was raised whether a specific protection for judicial data was necessary. The findings were different: on the one hand, some have estimated that a specificregulation was appropriate, on the other hand, others felt that the idea of establishing such rules must be abandoned. This study seems to have been - at some point - quitted. Given the improvements in technology and the evolution of European legislation, it seems essential to renew this question and try to find out which level of protection is given to judicial data in the current European system of protection of personal data. The importance to renew this question is proven by the case law of the Strasbourg Court. The latter has indeed been referred to cases of human rights violations due to improper processing of data in the judiciary. In addition, plans to reform the system of protection of personal data are currently under discussion at European level. Indeed, the Council of Europe and the European Union are currently working on the modernization of existing texts on the protection of personal data. It is therefore interesting to examine the place reserved for the protection of judicial data in the context of these reforms. The thesis recall the importance of protecting personal data at any time, in any place and in any field of activity, including the judiciary. Its main aim, on the one hand, is to highlight existing problems in the protection of judicial data and, on the other hand, to answer the question of whether a specific regulation in this area must nowadays be developed at European level. In the first part Council of Europe and the European Union’s texts on data protection and theirapplicability to the judicial data were analyzed. Given the fact that the texts currently into force at the Council of Europe and at the European Union, at first glance, have the same content, it has been necessary to analyze them with a comparative approach in order to understand their interoperability and verify their applicability to judicial data. Despite the multitude of texts on data protection present at European level (those of the Council of Europe and of the European Union), a marginal space is reserved to judicial data. The basic principles stated in these texts are in theory applicable to judicial data but in concrete those are not applied. In any case, those texts do not provide effective protection of judicial data. [...]
Nella nostra società, che può essere chiamata “società dell'informazione” o anche società di “sorveglianza elettronica”, è ormai indispensabile garantire la protezione dei dati personali. L'attuazione della normativa in materia di protezione dei dati non è sempre stata cosa facile, e per alcuni settori di attività, essa risulta tutt’ora un’operazione complessa. Il settoregiudiziario ne è un esempio. In effetti, si tratta di un settore in cui è stato difficile elaborare ed attuare regole specifiche ed adeguate per la protezione dei dati personali. Negli anni novanta, ci si è chiesti se fosse necessario provvedere all’adozione di regole specifiche per la protezione dei dati trattati a fini giudiziari. Secondo una prima teoria una regolamentazione specifica risultava opportuna, tuttavia secondo un’altra teoria l'idea di creare una regolamentazione per la protezione dei dati personali trattati in ambito giudiziario doveva essere accantonata. Lo studio di tale questione sembra essere stato - ad un certo punto - abbandonato. Dati i miglioramenti tecnologici intervenuti negli ultimi anni e l'evoluzione della legislazione europea in materia di protezione dei dati, sembra indispensabile porsi nuovamente la questione dell’opportunità di una regolamentazione specifica per il settore giudiziario. Sembra altresì opportuno interrogarsi sull’importanza che attualmente viene attribuita alla protezione dei dati trattati per finalità legali nell’ambito dell’attuale sistema europeo di protezione dei dati personali. Tale necessità sembra essere corroborata dal contenuto della giurisprudenza della Corte di Strasburgo. Quest'ultima è stata, infatti, spesso adita per casi di violazioni dei diritti fondamentali dovuti ad un trattamento illecito dei dati personali per ragioni di giustizia. Inoltre, dei progetti di riforma del sistema di protezione dei dati personali sono attualmente in discussione a livello europeo. Infatti, il Consiglio d'Europa e l'Unione europea stanno attualmente lavorando sulla modernizzazione dei testi esistenti in materia di protezione dei dati personali. E 'quindi altresì interessante esaminare quale importanza è data alla protezione dei dati giudiziari nel contesto di dette riforme. Oltre a ricordare l'importanza della protezione dei dati personali, in qualsiasi momento, in qualsiasi luogo e in qualsiasi settore di attività, tra cui quello giudiziario, l’obiettivo principale delle tesi è, da un lato, di evidenziare i problemi esistenti in materia di protezione dei dati giudiziari e, dall’altro, di valutare l’opportunità dell’esistenza a livello europeo di una normativa specifica per questo settore. Nella prima parte i testi del Consiglio d'Europa e dell'Unione europea in materia di protezione dei dati e la loro applicabilità al settore giudiziario sono analizzati. Tenuto conto del fatto ch i testi attualmente in vigore presso il Consiglio d'Europa e l'Unione europea hanno, di primo acchito, lo stesso contenuto, è stato necessario analizzarli con un’ottica comparatistica al fine di capire come essi si conciliano e di verificare la loro applicabilità ai dati giudiziari
Debaets, Émilie. "Le droit à la protection des données personnelles : recherche sur un droit fondamental". Thesis, Paris 1, 2014. http://www.theses.fr/2014PA010326.
Testo completoThe digital revolution is ambivalent. On the one hand, it empowers the State to strengthen its ability to fulfil its responsibilities and the individuals to exercise some of their rights, yet on the other hand, it enables the capturing and storing of an increasing part of day to day personal life. In order to address the increased surveillance of individuals, proposals are regularly put forward to incorporate, at the very highest judicial level, a human right to personal data protection, as the existence of such a right would improve the protection afforded to individuals. This thesis undertakes a descriptive, explanatory and evaluative analysis of the human right to personal data protection. In order to examine the making of such a right by the French constitutional court, the European Court of Human Rights and the Court of Justice of the European Union, this study sets out first to reveal its foundations. The right to data protection is then clearly identified and distinguished from other human rights such as the right to privacy. In order to measure the extent of such a right, the study then focusses on analysing the restrictions to which it may be subject when in conflict with other equally protected individual rights or with collective constraints of general interest. The enhancement of the protection afforded to the individual is therefore not as straightforward as it may initially seem. Such enhancement could however arise from the restructuring of the normative process which this human right to data protection implies
Oglaza, Arnaud. "Système d'aide à la décision pour la protection des données de vie privée". Thesis, Toulouse 1, 2014. http://www.theses.fr/2014TOU10015/document.
Testo completoWe are using more and more devices connected to the Internet. Our smartphones, tablets and now everyday items can share data to make our life easier. Sharing data may harm our privacy and there is a need to control them. However, this task is complex especially for non technical users. To facilitate this task, we present a decision support system, named KAPUER, that proposes high level authorization policies by learning users' privacy preferences. This learning phase is based on a multi criteria approach. We have defined an innovative model of problem solving using meta-criteria to express the different level of abstraction existing in autorisation policies. We also present KAGOP, an aggregation operator using our model of problem solving to take into account interactions between criteria. KAPUER has been implemented in an Android based system and a simulator has been developed to test it
Piolle, Guillaume. "Agents utilisateurs pour la protection des données personnelles : modélisation logique et outils informatiques". Phd thesis, Grenoble 1, 2009. https://theses.hal.science/tel-00401295.
Testo completoUsage in the domain of multi-agent systems has evolved so as to integrate human users more closely in the applications. Manipulation of private information by autonomous agents has then called for an adapted protection of personal data. This work first examines the legal context of privacy protection and the various computing methods aiming at personal data protection. Surveys show a significant need for AI-based solutions, allowing both reasoning on the regulations themselves and automatically adapting an agent's behaviour to these regulations. The Privacy-Aware (PAw) agent model and the Deontic Logic for Privacy, designed to deal with regulations coming from multiple authorities, are proposed here in this perspective. The agent's normative reasoning component analyses its heterogeneous context and provides a consistent policy for dealing with personal information. PAw agent then automatically controls its own usage of the data with regard to the resulting policy. In order to enforce policies in a remote manner, we study the different distributed application architectures oriented towards privacy protection, several of them based on the principles of Trusted Computing. We propose a complementary one, illustrating a different possible usage of this technology. Implementation of the PAw agent allows demonstration of its principles over three scenarios, thus showing the adaptability of the agent to its normative context and the influence of the regulations over the behaviour of the application
Piolle, Guillaume. "Agents utilisateurs pour la protection des données personnelles : modélisation logique et outils informatiques". Phd thesis, Université Joseph Fourier (Grenoble), 2009. http://tel.archives-ouvertes.fr/tel-00401295.
Testo completoles divers moyens informatiques destinés à la protection des données personnelles. Il en ressort un besoin de solutions fondées sur les méthodes d'IA, autorisant à la fois un raisonnement sur les réglementations et l'adaptation du comportement d'un agent à ces réglementations. Dans cette perspective, nous proposons le modèle d'agent PAw (Privacy-Aware) et la logique DLP (Deontic Logic for Privacy), conçue pour traiter des réglementations provenant d'autorités multiples. Le composant de raisonnement normatif de l'agent analyse son contexte hétérogène et fournit une politique cohérente pour le traitement des données personnelles. L'agent PAw contrôle alors automatiquement sa propre utilisation des données en regard de cette politique. Afin d'appliquer cette politique de manière distante, nous étudions les différentes architectures d'applications distribuées orientées vers la protection de la vie privée, notamment celles fondées sur les principes du Trusted Computing. Nous en proposons une complémentaire, illustrant la possibilité d'utiliser différemment cette technologie. L'implémentation de l'agent PAw permet la démonstration de ses principes sur trois scénarios, montrant ainsi l'adaptabilité de l'agent à son contexte normatif et l'influence des réglementations sur le comportement de l'application.
Zorn, Caroline. "Données de santé et secret partagé : pour un droit de la personne à la protection de ses données de santé partagées". Thesis, Nancy 2, 2009. http://www.theses.fr/2009NAN20011.
Testo completoThe medical professional secret is a legal exception to the professional secret; it allows a patient's caregivers to exchange health information that is relevant to that patient's care without being punished for revealing confidential information. That caregivers discuss patient's health information with other medical professional involved in that patient's care is to the benefit of the patient. Nonetheless, there is a fine balance to be struck between a "need to know" professional exchange of information, which is essential to care of the patient, and a broad exchange of information, which may ultimately comprise the confidentiality of the patient's private life. The emergence of an electronic tool, which multiplies the potential possibilities for data exchange, further disrupts this balance. Consequently, the manipulation of this shared health information must be subject to the medical professional secret, the "Informatique et Libertés" legislation, and all of the numerous norms and standards as defined by the French national electronic medical record (DMP), the pharmaceutical medical record (Dossier pharmaceutique), or the reimbursement repository (Historique des remboursements). As the patient's health information is increasingly shared between health care providers - through means such as the DMP or DP - the patient's right and ability to control the access to his/her health information have to become more and more important. A study regarding the importance of obtaining the patient's consent lead to the following proposal: to inscribe in the French Constitution the patient's right to confidentiality regarding health information
Elmajzoub, Mira. "La gestion des données personnelles dans le secteur de la police en Europe". Montpellier 1, 2004. http://www.theses.fr/2004MON10010.
Testo completoBen, Fredj Feten. "Méthode et outil d’anonymisation des données sensibles". Electronic Thesis or Diss., Paris, CNAM, 2017. http://www.theses.fr/2017CNAM1128.
Testo completoPersonal data anonymization requires complex algorithms aiming at avoiding disclosure risk without losing data utility. In this thesis, we describe a model-driven approach guiding the data owner during the anonymization process. The guidance may be informative or suggestive. It helps the data owner in choosing the most relevant algorithm given the data characteristics and the future usage of anonymized data. The guidance process also helps in defining the best input values for the algorithms. In this thesis, we focus on generalization algorithms for micro-data. The knowledge about anonymization is composed of both theoretical aspects and experimental results. It is managed thanks to an ontology
Alliot, Sandie. "Essai de qualification de la notion de données à caractère personnel". Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCB001.
Testo completoPersonal data has undergone a major change which justifies a new study of this notion. This particular data is at the heart of the digital economy and thus stirs numerous claims. What is at stake here is to try to work out a balance between different claims such as managing operators' will of appropriation and protecting people concerned by the data, for example. This is why it is essential to find a precise definition and adequate qualifications of personal data to find a balance between the various interests. The thesis will focus on the necessity to adopt a new vision of personal data, to show its current characteristics so as to manage it efficiently
Lechevalier, Fabien. "Les fiducies de données personnelles de santé : étude illustrée des enjeux et bénéfices d’une gestion collective de la propriété des données personnelles de santé". Master's thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/67590.
Testo completoBen, Fredj Feten. "Méthode et outil d’anonymisation des données sensibles". Thesis, Paris, CNAM, 2017. http://www.theses.fr/2017CNAM1128/document.
Testo completoPersonal data anonymization requires complex algorithms aiming at avoiding disclosure risk without losing data utility. In this thesis, we describe a model-driven approach guiding the data owner during the anonymization process. The guidance may be informative or suggestive. It helps the data owner in choosing the most relevant algorithm given the data characteristics and the future usage of anonymized data. The guidance process also helps in defining the best input values for the algorithms. In this thesis, we focus on generalization algorithms for micro-data. The knowledge about anonymization is composed of both theoretical aspects and experimental results. It is managed thanks to an ontology
Coulibaly, Ibrahim. "La protection des données à caractère personnel dans le domaine de la recherche scientifique". Phd thesis, Université de Grenoble, 2011. http://tel.archives-ouvertes.fr/tel-00798112.
Testo completoMattatia, Fabrice. "La protection des données à caractère personnel face aux usages illicites, déloyaux et frauduleux". Thesis, Paris 10, 2010. http://www.theses.fr/2010PA100099.
Testo completoThe widespread digital services give the user the possibility to access to information, procedures or entertainment, anywhere, at any time. This evolution is accompanied by an increase in the collection of personal data, in order, on the one hand, to offer the user the service most suited to its needs, and on the other hand, to fund the free services by behavioral marketing. This results in an ever-increasing risk of misuse or disclosure of such data, whether made by firms seeking to maximize their profits, or by cybercriminals seeking to exploit these data to commit frauds. The study of case law shows that the protection of the European data protection principles, as transposed in the French Data Protection Act, by the judiciary is relatively inadequate: prejudice is often insufficient to motivate action, offenses are too numerous, and the fraudster can act from abroad. Such a situation requires the use of a specialized regulator as the CNIL (French data protection authority), which has the ability to accumulate expertise and to adapt quickly to changes in its sector. Moreover, the involvement of the different actors in the frame of co-regulation or of self-regulation, is also desirable, to allow for a maximum dissemination of good practices and to prevent protection breaches. Digital services can also deal directly with their users
Martowicz, Patrick. "La protection des données de télédétection spatiale en droit privé comparé français et allemand". Toulouse 1, 1996. http://www.theses.fr/1996TOU10003.
Testo completoRemote sensing data is the very best example of new goods which statute law and jurisprudence consider only with great difficulties. The reason for lays in the non corporeal nature of those and its contents, ie the information itself. Therefore, analysis of the protection of remote sensing data requires the study of the possible appropriation through property right and copyright or neighbouring rights but also contract law and unfair competition. This approach underlines the differences between the French and the German system. For this reason, the European community has undertaken a directive draft proposal, creating a new right, sui generis which would apply on data bases notwithstanding copyright or neighbouring rights on the content of the latter. This sui generis right however is being presented as a new one; but it rather seems to be a quasi property right which had already been mentioned in some cases related to news information in the early century
Calas, Christel. "Pour une protection efficace des données et des traitements dans les systèmes informatiques répartis". Toulouse, ENSAE, 1995. http://www.theses.fr/1995ESAE0012.
Testo completoCaloprisco, Flavia. "La construction d'un droit spécifique à la protection des données personnelles dans l'Union Européenne". Thesis, Paris Est, 2019. http://www.theses.fr/2019PESC0011.
Testo completoThe thesis carries out a descriptive and evaluative analysis of the fundamental right to the protection of personal data. This right has been distinguished from other fundamental rights such as the right to respect for private life. In order to measure the impact of this right, the study analyzes the restrictions that may be placed on it when it conflicts with other equally protected individual interests or with the general interest on the basis of the proportionality principle. In fact, the digital revolution on the one hand allows people to exercise some of their rights but, on the other hand, allows the governments to control the individual. The progressive “constitutionalisation” of the right to personal data protection would improve the protection offered to the individual.Furthermore, the fundamental right to the protection of personal data would constitute a means of expressing the identity and values of the European Union.In a context marked by the technologies of surveillance and exchange of personal data, the European Union has chosen a model that respects fundamental rights.the role of the Court of Justice of the European Union appears to be central and strategic, not only at European level, but also globally, guaranteeing the right balance of interests by assessing the necessity and proportionality of the measures adopted. The recognition of the Charter of Fundamental Rights as a source of primary law has made a decisive contribution to the latest developments in its case-law in the matter and a decisive contribution to the process of autonomy with respect to the ECHR
Foissac, Véronique. "Conception et protection du système de gestion de données personnelles d'un établissement de santé". Montpellier 1, 2003. http://www.theses.fr/2003MON10002.
Testo completoLaroche, Benjamin. "Le big data à l’épreuve du règlement européen général sur la protection des données". Thesis, Toulouse 1, 2020. http://www.theses.fr/2020TOU10041.
Testo completoCitizens’ daily uses of technologies in a digital society exponentially produce data. In this context, the development of massive data collection appears as inevitable. Such technologies involve the processing of personal data in order to create economic value or to optimize business or decision-making processes. The General Data Protection Regulation (EU) 2016/679 (GDPR) aims to regulate these practices while respecting the imperatives of flexibility and technological neutrality. However, big data is proving to be an unprecedentedly complex legal issue, as its specific characteristics oppose several principles of the General Data Protection Regulation. Widely shared, this observation has gradually imposed an implicit form of status quo that does not allow for the effective resolution of the incompatibility between the reality of big data and the legal framework provided by the GDPR. In order to solve this equation, a distributive approach, based on the components of the big data: its structure, its data and its algorithmic capabilities, will then make it possible to study the qualification of this notion in order to identify an appropriate regime. Overcoming such a problem will, first of all, involve updating the qualification of personal data in order to respond to the increasing complexity of data processing carried out using advanced algorithmic capabilities. In addition, the accountability of the various actors involved, in particular through joint responsibilities for processing, will be associated with the notion of risk in order to bring the necessary updating to the regulation of big data. Finally, the application of a data protection impact analysis methodology will test and then synthesize the indispensable strengthening of the adequacy between legal theory and the practical reality of big data
Niyitegeka, David. "Composition de mécanismes cryptographiques et de tatouage pour la protection de données génétiques externalisées". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0225.
Testo completoNowadays, cloud computing allows researchers and health professionals to flexibly store and process large amounts of genetic data remotely, without a need to purchase and to maintain their own infrastructures. These data are especially used in genome-wide association studies (GWAS) in order to conduct the identification of genetic variants that are associated with some diseases. However, genetic data outsourcing or sharing in the cloud induces many security issues. In addition, a human genome is very sensitive by nature and represents the unique biological identity of its owner. The objective of this thesis work is to protect genetic data during their sharing, storage and processing. We have developped new security tools that are based on watermarking and cryptographic mechanisms, as well as on the combination of them. First, we have proposed a privacy-preserving method that allows to compute the secure collapsing method based on the logistic regression model using homomorphic encryption (HE). To overcome the computational and storage overhead of HE-based solutions, we have developed a framework that allows secure performing of GWAS for rare variants without increasing complexity compared to its nonsecure version. It is based on several security mechanisms including encryption. In parallel of these works, we have exploited the semantic security of some HE schemes so as to develop a dynamic watermarking method that allows integrity control for encrypted data. At last, we have developed a robust watermarking tool for GWAS data for traitor tracing purposes
Walczak, Nathalie. "La protection des données personnelles sur l’internet.- Analyse des discours et des enjeux sociopolitiques". Thesis, Lyon 2, 2014. http://www.theses.fr/2014LYO20052/document.
Testo completoThis thesis, in Communication and Information Sciences, raises the question of the internet personal data protection through the discourses analysis of four actors concerned with this subject: internet companies, authorities regulating, French population and national press. The objective is to understand how, through the discourses of each one of these actors, the question of the jamming of the spheres private and public about the Internet takes shape. It is a question which increases with the development of the Internet, in particular with the multiplication of the social digital network, which gives to the Internet users various opportunities to display their privacy. The multiplication of the interpersonal relationship devices connection is then accompanied by a contemporary dialectical between private and public spheres, not always controlled by concerned people.This interaction between private and public leads to a transfert of the border wich separates the two spheres and can involves some drifts on behalf of specialized companies, such Google and Facebook, toward the aggregation of personal data contents. Indeed, databases are central in the economic system of these companies and gained a commercial value. However, the commercial use as of these data is not necessarily known by the user and can be realized without its agreement, at least in an explicit way. This double questioning related to the jamming of the private and public spheres, i.e., firstly, the individual aspect where the Internet user is incited to reveal personal elements more and more, and, secondly, the related aspect with the selling of the data by the Internet companies, then generates the question of the individual freedom and data confidentiality. The regulating authorities, in France or in European Union, try to provide answers in order to protect the Internet users by setting up actions relating to the right to be forgotten or by prosecuting Google, for example, when the company does not conform to the laws in force on the territory concerned. The various angles of incidence as well as the diversity of the studied actors required the constitution of a multidimentional corpus in order to have a comparative approach of the different representations. This corpus includes texts registered like political discourses, regulating authorities speeches, companies of the Internet speeches, specifically Google and Facebook, or press speeches which occupy a meta-discursive position since they repeat speeches of the actors previously stated. It includes also oral speeches made up of talks especially recorded for this research with some persons taken randomly in the French population. A quantitative analysis of the discourses between 2010 and 2013, contemporary period with the thesis, permit to carry out a first sorting and to select only the most relevant speeches compared to our hypothesis. The qualitative analysis which followed was based on the theoretical framework previously elaborate in order to cross the representations of the actors in connection with the personal data and to highlight the various visions about this question
Qiu, Han. "Une architecture de protection des données efficace basée sur la fragmentation et le cryptage". Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0049.
Testo completoIn this thesis, a completely revisited data protection scheme based on selective encryption is presented. First, this new scheme is agnostic in term of data format, second it has a parallel architecture using GPGPU allowing performance to be at least comparable to full encryption algorithms. Bitmap, as a special uncompressed multimedia format, is addressed as a first use case. Discrete Cosine Transform (DCT) is the first transformation for splitting fragments, getting data protection, and storing data separately on local device and cloud servers. This work has largely improved the previous published ones for bitmap protection by providing new designs and practical experimentations. General purpose graphic processing unit (GPGPU) is exploited as an accelerator to guarantee the efficiency of the calculation compared with traditional full encryption algorithms. Then, an agnostic selective encryption based on lossless Discrete Wavelet Transform (DWT) is presented. This design, with practical experimentations on different hardware configurations, provides strong level of protection and good performance at the same time plus flexible storage dispersion schemes. Therefore, our agnostic data protection and transmission solution combining fragmentation, encryption, and dispersion is made available for a wide range of end-user applications. Also a complete set of security analysis are deployed to test the level of provided protection
Syla, Burhan. "Relais de perte de synchronisme par exploration de données". Thesis, Université Laval, 2012. http://www.theses.ulaval.ca/2012/29102/29102.pdf.
Testo completoThe goal of this document is to verify the feasability of an out-of-step relay using data mining and decision trees. Using EMTP-RV and the Anderson network, 180 simulations were done while changing the place of the short circuit, the length, the type and the load-flow. For these simulations, 39 electrical measures and 8 mechanical measures were made. These simulations were then classified as stable or instable using the center of inertia of angle and speed. With MATLAB, 33 new other variables were created by using the first 39, and then with KNIME, decisions trees such as C4.5, CART, ADABoost, ADTree and random forest were simulated and the sampling time versus the performances were compared. Using Consistency Subset Eval, Symmetrical Uncert Attribute Set Eval and Correlation-based Feature Subset Selection, the features were reduced and the simulations were visualised using the validation set. Results show that with a sampling frequency of 240 [Hz] and 28 variables is enough to obtain a mean area under the curve of 0.9591 for the training and the validation set of the 4 generators.
Eynard, Jessica. "Essai sur la notion de données à caractère personnel". Toulouse 1, 2011. http://www.theses.fr/2011TOU10046.
Testo completoAny information relating to a natural person who is or can be identified, directly or indirectly, was at first qualified as nominative information and then, as personal data. This new expression was adopted without any debate or concertation. Both notions share the same definition and the same regime so that they have been considered as synonymous. However, this transition from nominative information to personal data is a sign of a profound change. Indeed, if nominative information was related to information about the person, personal data is related to information - physical and psychological - of the person. Contrary to nominative information, personal data concerns the core of what makes a person a human being, a notion that that person ignores. From this observation, two criteria can be used to differentiate the both notions : the nature of the information concerned and the capacity to have an intellectual and a legal control over the information. Consequently, a new definition of personal data must be proposed. It comprises any information revelaing a biological or psychological part of a natural person who is or can be identified, directly or indirectly, and being beyond its intellectual and legal control. Because of this new definition, the regime protecting personal data must be modified so as to be confined to professional actors with the capacity to analyse and understand the data
Guo, Yanli. "Confidentialité et intégrité de bases de données embarquées". Versailles-St Quentin en Yvelines, 2011. http://www.theses.fr/2011VERS0038.
Testo completoAs a decentralized way for managing personal data, the Personal Data Server approach (PDS) resorts to Secure Portable Token, combining the tamper resistance of a smart card microcontroller with the mass storage capacity of NAND Flash. The data is stored, accessed and its access rights controlled using such devices. To support powerful PDS application requirements, a full-fledged DBMS engine is embedded in the SPT. This thesis addresses two problems with the confidentiality and integrity of personal data: (i) the database stored on the NAND Flash remains outside the security perimeter of the microcontroller, thus potentially suffering from attacks; (ii) the PDS approach relies on supporting servers to provide durability, availability, and global processing functionalities. Appropriate protocols must ensure that these servers cannot breach the confidentiality of the manipulated data. The proposed solutions rely on cryptography techniques, without incurring large overhead
Marillonnet, Paul. "La gestion des données personnelles par l'usager au sein des collectivités locales". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS011.
Testo completoThis Ph.D. addresses the user-centric management of Personally Identifiable Information (PII) within local collectivities. It has been realized as part of a CIFRE program between SAMOVAR and Entr’ouvert. There is a strong need to provide the users of the collectivities' online service with some PII management tools for respecting their privacy when submitting online requests to their collectivities. This need is also coupled with the challenges of free software (including open access to the code, and possibility to evaluate the software's security), which is part of Entr’ouvert’s philosophy. For illustration, a realistic use case is identified for the specific context of territorial collectivities and the public administration (TCPA). It enables to establish a list of useful functional requirements, and a set of users capabilities regarding the management of their own PII. The first contribution is about a technical comparative survey of academic and industrial solutions. This survey identifies thirteen solutions belonging to four different categories, and evaluates them according to eighteen functional criteria. Eventually, the survey provides per-category synthesis and identifies an optimal solution for our use case. The second contribution proposes a solution for supporting PII management, which respects the guidelines identified earlier as part of the survey's optimal solution. It also takes into consideration the PII retrieval from third-party sources. The solution, called the PII manager, operates thanks to its three main components: [i] the Source Backend (SB), [ii] the PII Query Interface (PQI) and [iii] the PII Management User Interface (PMUI). A detailed description of each of these three components is given in the manuscript. Additionally, the user-identifier mapping performed by the PQI is identified as a critical part of the solution. It requires security considerations, as failing to verify the consistency of this mapping can enable four types of attacks. The third contribution proposes an identity-matching solution to counteract the previously identified attacks. Indeed, there is a need to verify the validity of user identity information retrieved across several PII sources. This identity-matching solution requires to identify which components of the architecture is involved in that processing, the workflow across these components to support the full processing, and to perform a security analysis of the workflow that proves its strength against identified attempted attacks. The fourth contribution is the software validation of the proposed solutions through a proof of concept. The identity-matching solution is implemented thanks to the Django template filters and Entr’ouvert’s existing User-Relationship Management (URM) tool. The PII manager is also implemented as a new component to the existing software platform. Eventually, new perspectives are drawn. For instance, this research work could benefit from upcoming protocols such as the Grant Negotiation & Authorization Protocol (GNAP). Other new perspectives include the integration of the System for Cross-domain Identity Management (SCIM) into the platform and a larger-scale software validation