Gotowa bibliografia na temat „Gestion des identités numériques”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Gestion des identités numériques”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Gestion des identités numériques"
Ollier-Malaterre, Ariane. "La compétence numérique de gestion des frontières sur les réseaux sociaux numériques : un capital culturel technologique à la Bourdieu". Section 2 – Les nouveaux espaces et les nouvelles temporalités : flexibilisation, invisibilité et brouillage des frontières, nr 81 (19.02.2019): 121–37. http://dx.doi.org/10.7202/1056307ar.
Pełny tekst źródłaGrevisse, YENDE RAPHAEL, LOWEMBO A. TSHOTSHO Raymond-Albert, KABIENA KABASELE Emmanuel, MUKENDI MALUNDA Cedrick, KENA MULUMBA Clovis, KANDA KABAMBA Isaac i BUKASA MUKENGESHAYI Jean-Claude. "DEMATERIALISATION ET FRAUDE NUMERIQUE DES DOCUMENTS DANS LE SECTEUR DE L’ENSEIGNEMENT SUPERIEUR ET UNIVERSITAIRE EN RDC : Enjeux et Contraintes des TIC." International Journal of Electrical and Electronics Engineering Studies 8, nr 2 (15.02.2022): 30–45. http://dx.doi.org/10.37745/ijeees.13/vol8n23045.
Pełny tekst źródłaMorgand, Audrey. "Le rôle des plateformes numériques de rencontres professionnelles : apports, limites et risques". Management & Sciences Sociales N° 34, nr 1 (1.01.2023): 21–38. http://dx.doi.org/10.3917/mss.034.0021.
Pełny tekst źródłaWEREY, C., A. MEISTER, P. DI MAIOLO i C. CURT. "Gestion des eaux pluviales et prévention des inondations : quelle communication par les collectivités ?" 12, nr 12 (20.01.2022): 93–118. http://dx.doi.org/10.36904/tsm/202112093.
Pełny tekst źródłaMathias, Paul. "Note introductive aux identités numériques". Cités 39, nr 3 (2009): 59. http://dx.doi.org/10.3917/cite.039.0059.
Pełny tekst źródłaGeorges, Fanny. "Pratiques informationnelles et identités numériques". Études de communication, nr 35 (1.12.2010): 105–20. http://dx.doi.org/10.4000/edc.2226.
Pełny tekst źródłaCantin, Richard, i Jean-Claude Cryonnet. "Strategies d’identification des data utiles à la conduite d’opérations de construction". Acta Europeana Systemica 7 (11.07.2020): 51–64. http://dx.doi.org/10.14428/aes.v7i1.56633.
Pełny tekst źródłaJacopin, Bertrand, Emilie Andries, Yohann Beureno, Fabienne Mercier, Pierre-Yves Valantin i Yann Laborda. "Atlas dynamique des zones inondables : outil operationnel d'aide à la décision". La Houille Blanche, nr 1 (luty 2019): 13–18. http://dx.doi.org/10.1051/lhb/2019002.
Pełny tekst źródłaPinède, Nathalie. "Du site web aux identités numériques organisationnelles". Questions de communication, nr 34 (31.12.2018): 75–94. http://dx.doi.org/10.4000/questionsdecommunication.15587.
Pełny tekst źródłaGeorges, Fanny. "« A l'image de l'Homme » : cyborgs, avatars, identités numériques". Le Temps des médias 18, nr 1 (2012): 136. http://dx.doi.org/10.3917/tdm.018.0136.
Pełny tekst źródłaRozprawy doktorskie na temat "Gestion des identités numériques"
Ates, Mikaël. "Identités numériques : gestion inter-organisationnelle centrée sur l'utilisateur et respectueuse de la vie privée". Phd thesis, Université Jean Monnet - Saint-Etienne, 2009. http://tel.archives-ouvertes.fr/tel-00443910.
Pełny tekst źródłaMarillonnet, Paul. "La gestion des données personnelles par l'usager au sein des collectivités locales". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS011.
Pełny tekst źródłaThis Ph.D. addresses the user-centric management of Personally Identifiable Information (PII) within local collectivities. It has been realized as part of a CIFRE program between SAMOVAR and Entr’ouvert. There is a strong need to provide the users of the collectivities' online service with some PII management tools for respecting their privacy when submitting online requests to their collectivities. This need is also coupled with the challenges of free software (including open access to the code, and possibility to evaluate the software's security), which is part of Entr’ouvert’s philosophy. For illustration, a realistic use case is identified for the specific context of territorial collectivities and the public administration (TCPA). It enables to establish a list of useful functional requirements, and a set of users capabilities regarding the management of their own PII. The first contribution is about a technical comparative survey of academic and industrial solutions. This survey identifies thirteen solutions belonging to four different categories, and evaluates them according to eighteen functional criteria. Eventually, the survey provides per-category synthesis and identifies an optimal solution for our use case. The second contribution proposes a solution for supporting PII management, which respects the guidelines identified earlier as part of the survey's optimal solution. It also takes into consideration the PII retrieval from third-party sources. The solution, called the PII manager, operates thanks to its three main components: [i] the Source Backend (SB), [ii] the PII Query Interface (PQI) and [iii] the PII Management User Interface (PMUI). A detailed description of each of these three components is given in the manuscript. Additionally, the user-identifier mapping performed by the PQI is identified as a critical part of the solution. It requires security considerations, as failing to verify the consistency of this mapping can enable four types of attacks. The third contribution proposes an identity-matching solution to counteract the previously identified attacks. Indeed, there is a need to verify the validity of user identity information retrieved across several PII sources. This identity-matching solution requires to identify which components of the architecture is involved in that processing, the workflow across these components to support the full processing, and to perform a security analysis of the workflow that proves its strength against identified attempted attacks. The fourth contribution is the software validation of the proposed solutions through a proof of concept. The identity-matching solution is implemented thanks to the Django template filters and Entr’ouvert’s existing User-Relationship Management (URM) tool. The PII manager is also implemented as a new component to the existing software platform. Eventually, new perspectives are drawn. For instance, this research work could benefit from upcoming protocols such as the Grant Negotiation & Authorization Protocol (GNAP). Other new perspectives include the integration of the System for Cross-domain Identity Management (SCIM) into the platform and a larger-scale software validation
Masmoudi, Souha. "Malleable privacy-enhancing-technologies for privacy-preserving identity management systems". Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS023.
Pełny tekst źródłaDigital identities are, nowadays, used at a large scale (i.e., in public services, social medias, at work, online shopping, etc.). This brings usability issues as users are constrained to deal with multiple identities and attributes for access control and data sharing objectives. In addition, security and privacy challenges have arisen as the interacting entities, those that issue, process and collect these identities can, due to their behavior or security deficiencies, lead to identity theft, massive data collection and tracking of users' behaviors on the Internet.This thesis aims at finding the best trade-off between security, privacy and usability for identity management systems, based on cryptographic primitives. The first two contributions focus on identity management for access control and consider real identities and attributes that contain personal (e.g., age) and sensitive (e.g., biometric traits) information.The first contribution proposes a user-centric and privacy-preserving identity management system in which users keep control over their attributes. A user, that receives attributes certified by an identity provider, is able to interact, in a pseudonymized manner, with a service provider and prove the authenticity of the provided attributes while ensuring that he discloses only the minimum number of attributes. This solution is based on a new malleable signature scheme that allows users to modify the certificate issued by the identity provider on his attributes in a restricted and controlled manner. It also preserves privacy by satisfying the unlinkability property between curious service providers that try to link different transactions to the same user.The second contribution presents a new biometric authentication scheme that offers robustness and privacy guarantees. Three steps are required. First, the user physically visits the identity provider that pushes an encrypted and certified biometric template onto his smartphone. Then he remotely enrolls at a service provider, in an anonymous manner. Finally, he authenticates offline to the service provider that captures a new biometric template in order to be locally verified via the smartphone. By relying on malleable signatures, the proposed solution prevents the use of fake biometric identities and guarantees the authentication soundness. Unlinkability and anonymity are also preserved.The third contribution provides a solution to meet the need of data sharing in an identity management system. In particular, it studies the management of users ephemeral attributes in the context of proximity tracing for e-healthcare systems. The proposed solution ensures data consistency and integrity and preserves the privacy of users who share their contact information with people in proximity. Alerts are issued to users who have been in contact with infected persons. The use of a hybrid architecture, which relies on a centralized server and decentralized proxies, allows to prevent malicious users from injecting false alerts, and to prevent the linkability of contact information to the same user and the re-identification of users involved in contact with an infected person
Abakar, Mahamat Ahmat. "Etude et mise en oeuvre d'une architecture pour l'authentification et la gestion de documents numériques certifiés : application dans le contexte des services en ligne pour le grand public". Phd thesis, Université Jean Monnet - Saint-Etienne, 2012. http://tel.archives-ouvertes.fr/tel-00975965.
Pełny tekst źródłaChanton, Olivier. "Stratégies de gestion des identités et influence sociale". Paris 10, 1999. http://www.theses.fr/1999PA100120.
Pełny tekst źródłaAissaoui, Mehrez Hassane. "Sécurité pour les réseaux du futur : gestion sécurisée des identités". Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066606.
Pełny tekst źródłaToday, the Internet is changing radically our habits, especially with the massive influx of the nomadic techniques, the Internet of objects, the growing use of grid computing, wireless networks and the emergence of new approaches in recent years. In particular, the virtualization of the computing infrastructures, which allowed defining a new model called Cloud Computing, introducing an enough frank breakdown with the traditional models, can be perceived as a preparatory stage towards the Internet of future.The implementation of these approaches allows, in a different way : mutualization and organization of the computer system. It allows to dematerialize the physical infrastructures and to deport applications on distant containers. Therefore, the global architecture of Internet should be evolved. It will rely strongly on these new approaches and in particular, Cloud Computing and virtualization. However, no system is infallible especially if resources are distributed and mutualized. They raise a number of problems and involve directly security issues, which remain one of the main barriers to the adoption of these technologies.Like any new technology, Cloud Computing and virtualization create new risks, which come to graft to traditional threats of the outsourcing management of the privilege separation, the identity and accesses management, the robustness of the virtualization software, the virtual machine isolation, the personal data protection, reversibility, privacy... The traditional Internet architecture cannot provide the adequate solutions to the challenges raised by these new approaches: mobility, flexibility, security requirements, reliability and robustness. Thus, a research project (SecFuNet : Security For Future Networks) was validated by the European Commission, to provide some answers, to make a state of the art of these security mechanisms and a comprehensive study of orchestration and integration techniques based on protection components within overall security architecture
Aissaoui, Mehrez Hassane. "Sécurité pour les réseaux du futur : gestion sécurisée des identités". Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066606.
Pełny tekst źródłaToday, the Internet is changing radically our habits, especially with the massive influx of the nomadic techniques, the Internet of objects, the growing use of grid computing, wireless networks and the emergence of new approaches in recent years. In particular, the virtualization of the computing infrastructures, which allowed defining a new model called Cloud Computing, introducing an enough frank breakdown with the traditional models, can be perceived as a preparatory stage towards the Internet of future.The implementation of these approaches allows, in a different way : mutualization and organization of the computer system. It allows to dematerialize the physical infrastructures and to deport applications on distant containers. Therefore, the global architecture of Internet should be evolved. It will rely strongly on these new approaches and in particular, Cloud Computing and virtualization. However, no system is infallible especially if resources are distributed and mutualized. They raise a number of problems and involve directly security issues, which remain one of the main barriers to the adoption of these technologies.Like any new technology, Cloud Computing and virtualization create new risks, which come to graft to traditional threats of the outsourcing management of the privilege separation, the identity and accesses management, the robustness of the virtualization software, the virtual machine isolation, the personal data protection, reversibility, privacy... The traditional Internet architecture cannot provide the adequate solutions to the challenges raised by these new approaches: mobility, flexibility, security requirements, reliability and robustness. Thus, a research project (SecFuNet : Security For Future Networks) was validated by the European Commission, to provide some answers, to make a state of the art of these security mechanisms and a comprehensive study of orchestration and integration techniques based on protection components within overall security architecture
Soenen, Guillaume. "Identités organisationnelles et communautés de pratique : Le cas d'une société de conseil". Jouy-en Josas, HEC, 2006. http://www.theses.fr/2006EHEC0014.
Pełny tekst źródłaThis thesis deals with organizational learning, and more specifically with learning organizations. I mobilize the concept of organizational identity and focuses on a specific mode of organizing: intra-organizational communities of practice. First, I develop a model conceptualizing organizational identity as a system composed of five interacting facets. Second, I articulate a renewed definition of communities of practice as collective answers to prescription failures. A quantitative study of four communities of practice allows the establishment of a link between membership into a community and individuals' preference for certain sources of knowledge. This result confirms that communities of practice are more than a mere linguistic formula and are a distinct psycho-sociological reality. In a third phase, a comparative study is used to reveal the factors which contribute to this specific form of social network that can be defined as an “organizational mousse”
Sagastizábal, Claudia A. "Quelques méthodes numériques d'optimisation : Application en gestion de stocks". Paris 1, 1993. http://www.theses.fr/1993PA010067.
Pełny tekst źródłaRaad, Joe. "Gestion d'identité dans des graphes de connaissances". Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLA028/document.
Pełny tekst źródłaIn the absence of a central naming authority on the Web of data, it is common for different knowledge graphs to refer to the same thing by different names (IRIs). Whenever multiple names are used to denote the same thing, owl:sameAs statements are needed in order to link the data and foster reuse. Such identity statements have strict logical semantics, indicating that every property asserted to one name, will also be inferred to the other, and vice versa. While such inferences can be extremely useful in enabling and enhancing knowledge-based systems such as search engines and recommendation systems, incorrect use of identity can have wide-ranging effects in a global knowledge space like the Web of data. With several studies showing that owl:sameAs is indeed misused for different reasons, a proper approach towards the handling of identity links is required in order to make the Web of data succeed as an integrated knowledge space. This thesis investigates the identity problem at hand, and provides different, yet complementary solutions. Firstly, it presents the largest dataset of identity statements that has been gathered from the LOD Cloud to date, and a web service from which the data and its equivalence closure can be queried. Such resource has both practical impacts (it helps data users and providers to find different names for the same entity), as well as analytical value (it reveals important aspects of the connectivity of the LOD Cloud). In addition, by relying on this collection of 558 million identity statements, we show how network metrics such as the community structure of the owl:sameAs graph can be used in order to detect possibly erroneous identity assertions. For this, we assign an error degree for each owl:sameAs based on the density of the community(ies) in which they occur, and their symmetrical characteristics. One benefit of this approach is that it does not rely on any additional knowledge. Finally, as a way to limit the excessive and incorrect use of owl:sameAs, we define a new relation for asserting the identity of two ontology instances in a specific context (a sub-ontology). This identity relation is accompanied with an approach for automatically detecting these links, with the ability of using certain expert constraints for filtering irrelevant contexts. As a first experiment, the detection and exploitation of the detected contextual identity links are conducted on two knowledge graphs for life sciences, constructed in a mutual effort with domain experts from the French National Institute of Agricultural Research (INRA)
Książki na temat "Gestion des identités numériques"
préface de Jacques Perriault Coordonné par Alexandre Coutant et Thomas Stenger. Identités numériques. Paris: Editions L'Harmattan, 2013.
Znajdź pełny tekst źródłaPalamides, Thomas. Hollywood vinaigrette: Finding partnerships in digital entertainment = Vinaigrette à la Hollywood : former des partenariats dans l'industrie du divertissement numérique. Ottawa, Ont: Foreign Affairs and International Trade = Affaires étrangères et Commerce international, 2005.
Znajdź pełny tekst źródłaThomas, Palamides, i Canada. Consulate General (Los Angeles, Calif.), red. Hollywood vinaigrette: Finding partnerships in digital entertainment. [Los Angeles]: Consulate General of Canada, 2005.
Znajdź pełny tekst źródłaBarrett, Colin. Passez au numérique: Faites revivre le passé! Köln: Evergreen, 2006.
Znajdź pełny tekst źródłaAmerican Academy of Professional Coders, red. Official CPC certification study guide. Clifton Park, N.Y.]: Delmar Cengage Learning, 2014.
Znajdź pełny tekst źródła1961-, Leow Wee-Kheng, red. Image and video retrieval: 4th international conference, CIVR 2005, Singapore, July 20-22, 2005 ; proceedings. Berlin: Springer, 2005.
Znajdź pełny tekst źródłaTittel, Ed. Computer telephony: Automating home offices and small businesses. Boston: AP Professional, 1996.
Znajdź pełny tekst źródłaTittel, Ed. Computer telephony: Automating home offices and small business. Boston: AP Professional, 1996.
Znajdź pełny tekst źródłaDigital asset management. Wyd. 2. Oxford: Focal, 2006.
Znajdź pełny tekst źródłaIntelligent image databases: Towards advanced image retrieval. Boston: Kluwer Academic Publishers, 1998.
Znajdź pełny tekst źródłaCzęści książek na temat "Gestion des identités numériques"
Dumas, Geneviève. "Le livre de mémoires des notaires Bertrand Paul (1397-1400) et Jean du Pin (1401-1419) : gestion documentaire et mémoire urbaine". W Les identités urbaines au Moyen Âge. Regards sur les villes du Midi français, 81–92. Turnhout: Brepols Publishers, 2014. http://dx.doi.org/10.1484/m.seuh-eb.5.101523.
Pełny tekst źródłaFourmentraux, Jean-Paul. "Présentation générale. Identités et liaisons numériques". W Identités numériques, 9–23. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20358.
Pełny tekst źródła"(Dé)jouer les identités numériques : Net art et médiactivisme". W Identités numériques, 25–32. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20361.
Pełny tekst źródłaDoueihi, Milad. "L’identité à l’ère des Digital Humanities". W Identités numériques, 33–52. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20364.
Pełny tekst źródłaCoutant, Alexandre. "Des techniques de soi ambivalentes". W Identités numériques, 53–65. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20370.
Pełny tekst źródłaParmentier, Marc. "Philosophie des sites de rencontres". W Identités numériques, 67–80. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20373.
Pełny tekst źródłaBeau, Frank. "Une figure du double numérique : l’avatar". W Identités numériques, 81–96. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20379.
Pełny tekst źródłaCardon, Dominique. "L’identité comme stratégie relationnelle". W Identités numériques, 97–106. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20385.
Pełny tekst źródłaLivingstone, Sonia, Giovanna Mascheroni i Maria Francesca Murru. "Utilisation des réseaux socionumériques par les jeunes Européens". W Identités numériques, 107–25. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20388.
Pełny tekst źródłaPerriault, Jacques. "Géolocalisation et incertitude". W Identités numériques, 127–31. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20397.
Pełny tekst źródłaStreszczenia konferencji na temat "Gestion des identités numériques"
Joliveau, Thierry. "Voir le monde comme il paraît ou le rôle des visualisations réalistes dans la gestion territoriale". W Paysages & valeurs : de la représentation à la simulation. Limoges: Université de Limoges, 2008. http://dx.doi.org/10.25965/as.3399.
Pełny tekst źródłaRaporty organizacyjne na temat "Gestion des identités numériques"
Motulsky, Aude, Philippe Després, Cécile Petitgand, Jean Noel Nikiema, Catherine Régis i Jean-Louis Denis. Veille sur les outils numériques en santé dans le contexte de COVID-19. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, październik 2020. http://dx.doi.org/10.61737/gfie5726.
Pełny tekst źródłaRousseau, Henri-Paul. Gutenberg, L’université et le défi numérique. CIRANO, grudzień 2022. http://dx.doi.org/10.54932/wodt6646.
Pełny tekst źródłaMcAdams-Roy, Kassandra, Philippe Després i Pierre-Luc Déziel. La gouvernance des données dans le domaine de la santé : Pour une fiducie de données au Québec ? Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, luty 2023. http://dx.doi.org/10.61737/nrvw8644.
Pełny tekst źródła