Gotowa bibliografia na temat „Mécanisme de gestion de la confiance”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Mécanisme de gestion de la confiance”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Mécanisme de gestion de la confiance"
Dureau, Romain, i Philippe Jeanneaux. "Importance de la confiance dans la gestion collective des risques de pullulation de ravageurs". Cahiers Agricultures 32 (2023): 14. http://dx.doi.org/10.1051/cagri/2023006.
Pełny tekst źródłaGardès, Nathalie, i Isabelle Maque. "La compétence relationnelle de l’entreprise". Revue internationale P.M.E. 25, nr 2 (28.05.2013): 129–57. http://dx.doi.org/10.7202/1015802ar.
Pełny tekst źródłaBettache, Mustapha. "La concertation patronale-syndicale au Québec : consultation ou décision conjointe? Des différences de perception et retombées sur la mobilisation des employés". Revue multidisciplinaire sur l'emploi, le syndicalisme et le travail 5, nr 1 (1.03.2010): 27–69. http://dx.doi.org/10.7202/039359ar.
Pełny tekst źródłaBaudry, Bernard. "Qualité des produits et coordination dans la relation de sous-traitance : une analyse économique de la procédure de certification industrielle". Notes de recherche 12, nr 4 (16.02.2012): 57–75. http://dx.doi.org/10.7202/1008665ar.
Pełny tekst źródłaJaccard Merlin, Odile. "AMÉLIORER LA GESTION COGNITIVE ET ÉMOTIONNELLE D’ENFANTS ET ADOLESCENTS ÂGÉS DE 11 À 14 ANS ATTEINTS DE TROUBLES DU NEURODÉVELOPPEMENT". Cortica 2, nr 1 (20.03.2023): 215–48. http://dx.doi.org/10.26034/cortica.2023.3802.
Pełny tekst źródłaPlaisance, Guillaume. "Accroître l’impact perçu des associations : le rôle des mécanismes spontanés et spécifiques de gouvernance". Gestion et management public Volume 11 / N° 3, nr 3 (13.12.2023): 97–120. http://dx.doi.org/10.3917/gmp.113.0097.
Pełny tekst źródłaBriand, Louise, i Guy Bellemare. "Rapports de confiance/surveillance dans les entreprises". Hors thème, nr 40 (2.05.2011): 227–50. http://dx.doi.org/10.7202/1002423ar.
Pełny tekst źródłaMansour, Nizar, Chiraz Saidani, Malek Saihi i Samia Laaroussi. "Réseaux sociaux au travail, confiance interpersonnelle et comportement de partage des connaissances". Articles 69, nr 2 (13.05.2014): 316–43. http://dx.doi.org/10.7202/1025031ar.
Pełny tekst źródłaMbassi, Jean-Claude, i Richard Nkene Ndeme. "La mobilisation du « health belief model modifié » en communication publique peut-elle contribuer au changement de comportement en période de COVID-19 ?" Communication & management Vol. 20, nr 2 (14.02.2024): 63–80. http://dx.doi.org/10.3917/comma.202.0063.
Pełny tekst źródłaCouture, Nancy. "De la confiance en soi à l’exercice de la citoyenneté". Écho de pratique 25, nr 2 (6.12.2013): 247–59. http://dx.doi.org/10.7202/1020833ar.
Pełny tekst źródłaRozprawy doktorskie na temat "Mécanisme de gestion de la confiance"
Masmoudi, Mariam. "Prévention des attaques de confiance en temps réel dans l'IoT social". Electronic Thesis or Diss., Toulouse 3, 2023. http://www.theses.fr/2023TOU30302.
Pełny tekst źródłaThe social IoT is a new paradigm that enhances the navigability of IoT networks and boosts service discovery by integrating social contexts. Nonetheless, this paradigm faces several challenges that reduce its performance quality. Trust, particularly trust attacks, is one of the most significant challenges. Some users resort to malicious behaviors and launch attacks to propagate malicious services. A trust management mechanism has become a major requirement in Social IoT to prevent these attacks in real-time and ensure trustworthy experiences for end-users. However, few studies have addressed trust management issues to prevent trust attacks in Social IoT environments. Most studies have been conducted to detect offline attacks with or without specifying the type of attack performed. Moreover, they did not consider security properties, such as cryptography, transparency, and immutability, etc. In fact, we must continuously process transactions to prevent these attacks at the transaction generation level while maintaining security properties. For this, we compared the previously used techniques and technologies, whose common point is attack prevention in the SN and IoT areas. Based on these comparisons, we indicated that blockchain technology can assist in developing a trust management mechanism that can prevent trust attacks while maintaining security. For real-time prevention, we proposed the combination of a distributed stream processing engine, known as Apache Spark, with blockchain technology. Our choice is based on a comparison of open-source data-stream processing engines. As a result, we propose a new trust management mechanism, based on blockchain and Apache Spark. This mechanism permit to prevent in real-time all trust attack types performed by malicious nodes, in order to obtain a reliable environment. Experimentation made on a real data-set enable us to prove the performance of our proposition
Neuville, Jean-Philippe. "Le contrat de confiance : étude des mécanismes de coopération dans le partenariat industriel autour de deux grands constructeurs automobiles européens". Paris, Institut d'études politiques, 1996. http://www.theses.fr/1996IEPP0005.
Pełny tekst źródłaThe industrial partnership is one of the possible forms of the organized action between market and hierarchy. With the tools of the sociological analysis of organizations, an empirical comparison of two partnerships is carried out in the automobile manufacturing sector in europe. Results show that this form of industrial cooperation is characterized, first by a common framework : quality ; second; by a specific regulation mecanism : trust ; finally, by a structure of social exchange in which economic exchange is embedded in : interpersonal networks
Chaulet, Johann. "La confiance médiatisée : la confiance et sa gestion au sein des communications médiatisées". Toulouse 2, 2007. https://hal.archives-ouvertes.fr/tel-01252308.
Pełny tekst źródłaThis thesis is about the usages of mediated communication devices. Its aim is to understand how their generalization renews the way people “equip” and deal with their trust relationships. This interest for the notion of trust leads us to place the questions of information, availability, commitment and surveillance in the center of our analysis. Due to the pertinence of this broadening the study of “close relationships” has been complemented by relations centered around a specific goal (via the study of internet connecting websites) and contractual relationships in very equipped work places (in call centers). The diversity of these situations allows us to examine the confrontation of the two main concepts of mediation and trust. It seems that, if these mediations don't change the main grounds of trust, they do modify some aspects of relations to others and the uncertainty they imply. Our findings document the hypothesis of growing rationalization of communication and relational practices based, mainly, on new information that those always more numerous mediations produce
Vu, Van-Hoan. "Infrastructure de gestion de la confiance sur internet". Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2010. http://tel.archives-ouvertes.fr/tel-00611839.
Pełny tekst źródłaMasmoudi, Khaled. "Gestion de la confiance dans les réseaux personnels". Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0002.
Pełny tekst źródłaWith the advent of new networking paradigms and evolutions, spanning from distributed and self-organized systems such as ad hoc networks, P2P networks or grids, to pervasive computing, wireless mesh networks or embedded devices, many research effort have been conducted to bring the previous theoretic concepts into real life. Security protocols have to fulfill a new requirement : how is it possible to establish trust between parties without any a priori credential, central administration or shared context ? We go even farther in this dissertation : what if each single party was a heterogeneous distributed domain ? This thesis builds a layered architecture with a set of cryptographic protocols, meant to establish trust between devices and services belonging to different users through their Personal Networks. In the first part, the trust vector is an out-of-band channel, based on proximity. The resulting protocols combine identity-based cryptography to link identities to cryptographic material, and cryptographically-generated addresses to provide identity ownership. These new identifiers form a novel namespace that allows cross-layer trust establishment. The de facto security negotiation protocols, namely Internet Key Exchange protocol and Transport layer Security handshake sub-protocol, provide end-to-end secure tunnel establishment, but fail to fit scenarios when a domain controller has to define the security parameters for a device under its supervision. We define in the second part of this dissertation how extensions could be applied to fullfill the previous requirement and delegate tunnel negotiation to a third party. Security validation results and the details of a preliminary implementation are also provided. Last, we design a framework for establishing trust basing on the entity behavior within a group of Personal Networks that share a part of their devices and services. Focusing on service discovery, we show that reputation-based trust can be applied to mitigate selfishness and fake announcements in a federation of Personal Networks
Dementhon, Agathe. "De la confiance aux représentations sociales : un nouvel éclairage théorique du concept de confiance : le cas de la confiance dans l'achat industriel". Paris 10, 2001. http://www.theses.fr/2001PA100013.
Pełny tekst źródłaWazan, Ahmad Samer. "Gestion de la confiance dans les infrastructures à clés publiques". Toulouse 3, 2011. http://thesesups.ups-tlse.fr/1450/.
Pełny tekst źródłaToday, the Internet has become a universal community, where the openness to diverse application areas, has been accompanied by a natural change in the profile of users. However, in this environment, the maturity of the services and applications is suffering from a problem of trust. The establishment of trust in the Internet requires the intervention of several elements. We refer to these elements by the term: trust chain. In all chains of trust, public key infrastructure (PKI) is a central element. It serves to establish a link between a public key and a physical entity whose certificate signed by a central entity called a certification authority (CA). Thus, PKIs provide means for the management and the distribution of keys and certificates. All elements of the trust chain create a trust management problem. We have dedicated our work, however, to PKIs, and more precisely in trust management of CAs. We have performed the following steps: • We have proposed a formal definition of trust in CAs. • We have defined an architecture that operates a validation service deployed by an entity independent of CAs, and recognized by a community of interest. • We have defined a calculation model that enables us to obtain a score between 0 and 1 representing the quality of a certificate (QoCER). Finally, we have implemented a prototype that demonstrates our ideas. In particular, we have presented how end users can interact with the validation service to make informed decisions about certificates
Hasrouny, Hamssa. "Gestion de confiance et solutions de sécurité pour les réseaux véhiculaires". Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0001/document.
Pełny tekst źródłaVANETs (Vehicular Ad-hoc Networks) consist of vehicles capable of exchanging information by radio to improve road safety (alerts in case of accidents or in case of abnormal slowdowns, collaborative driving…) or allow internet access for passengers (collaborative networks, infotainment, etc.). Road safety messages exchanged between vehicles may be falsified or eliminated by malicious entities in order to cause accidents and endanger people life. In this thesis, we focus on defining, designing and evaluating a security solution for V2V communications in VANET, to ensure a secure communication and a good level of confidence between the different participating vehicles. Adopting a group-based model, we consider the Trustworthiness evaluation of vehicles participating in VANET and we develop a Trust Model to analyze the behavior of the vehicles in the group while preserving the privacy of the participants and maintaining low network overhead. We then propose a hierarchical and modular framework for Misbehavior Detection and Revocation Management
Hasrouny, Hamssa. "Gestion de confiance et solutions de sécurité pour les réseaux véhiculaires". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0001.
Pełny tekst źródłaVANETs (Vehicular Ad-hoc Networks) consist of vehicles capable of exchanging information by radio to improve road safety (alerts in case of accidents or in case of abnormal slowdowns, collaborative driving…) or allow internet access for passengers (collaborative networks, infotainment, etc.). Road safety messages exchanged between vehicles may be falsified or eliminated by malicious entities in order to cause accidents and endanger people life. In this thesis, we focus on defining, designing and evaluating a security solution for V2V communications in VANET, to ensure a secure communication and a good level of confidence between the different participating vehicles. Adopting a group-based model, we consider the Trustworthiness evaluation of vehicles participating in VANET and we develop a Trust Model to analyze the behavior of the vehicles in the group while preserving the privacy of the participants and maintaining low network overhead. We then propose a hierarchical and modular framework for Misbehavior Detection and Revocation Management
Coste, Benjamin. "Détection contextuelle de cyberattaques par gestion de confiance à bord d'un navire". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0106/document.
Pełny tekst źródłaNavigation and ship’s management are two essential aspects for the security of the ship itself and people on board as much as the maritime environment protection. Modern ships ensure these functions by increasingly embedding connected and automated technologies such as sensors, actuators, programmable logic controllers and pieces of software. However, the security of this objects as well as the trust in the information they produce cannot be guaranteed: they can be deceived or under the control of a malicious third party. In this context, a novel approach of data falsification detection is proposed. It is based on trust assessment of information system components which can be seen as inter-related functional blocks producing, processing and receiving pieces of information. The trust one can have inproduction blocks, called information sources, is assessed through its ability to report real situation of the ship. Trust is then propagated to the remainder part of the system. A simulator was made thanks to which we experiment several scenarios including intentional modification of numerical data. In these cases and under some conditions, the variability of trust give us the ability to identify the attack occurrence as much as its target. Our proposition is not restricted to naval information systems and can be employed in various situations even with human factor
Książki na temat "Mécanisme de gestion de la confiance"
Institut de socio-économie des entreprises et des organisations., red. Confiance et gestion. Grenoble: Presses Universitaires de Grenoble, 1998.
Znajdź pełny tekst źródłaLuhmann, Niklas. La confiance: Un mécanisme de réduction de la complexité sociale. Paris: Economica, 2006.
Znajdź pełny tekst źródłaLethielleux, Laëtitia. L'essentiel de la gestion des ressources humaines. Wyd. 3. Paris: Gualino-Lextenso éd., 2009.
Znajdź pełny tekst źródłaSchutz, Will. L' Élément humain: Comprendre le lien entre estime de soi, confiance et performance. Paris: Intereditions, 2006.
Znajdź pełny tekst źródłaApril, Gaston. Le choc des croyances pour un management du XXIIe siècle. Notre-Dame-des-Neiges, Qc: Éditions Trois-Pistoles, 2003.
Znajdź pełny tekst źródłaYoung, Jeffrey E. Je réinvente ma vie: Vous valez mieux que vous ne pensez. Montréal, Qué: Éditions de l'Homme, 2003.
Znajdź pełny tekst źródłaYoung, Jeffrey E. Je réinvente ma vie: Vous valez mieux que vous ne pensez. [Montréal]: Éditions de l'Homme, 1995.
Znajdź pełny tekst źródłaRagnar, Löfstedt, i Cvetkovich George, red. Social trust and the management of risk. London: Earthscan, 1999.
Znajdź pełny tekst źródłaMichael, Siegrist, Earle Timothy C i Gutscher Heinz, red. Trust in cooperative risk management: Uncertainty and scepticism in the public mind. London: Earthscan, 2007.
Znajdź pełny tekst źródłaTracy, Diane. Truth, trust, and the bottom line: 7 steps to trust-based management. Chicago Ill: Dearborn Trade, 2001.
Znajdź pełny tekst źródłaCzęści książek na temat "Mécanisme de gestion de la confiance"
Anctil, Pierre. "L’accommodement raisonnable dans le contexte légal canadien: mécanisme de gestion de la diversité ou source de tensions". W Travelling Concepts, 27–46. Wiesbaden: VS Verlag für Sozialwissenschaften, 2010. http://dx.doi.org/10.1007/978-3-531-92139-6_2.
Pełny tekst źródłaGaussot, Ludovic, i Nicolas Palierne. "Chapitre II. Gestion de l’information et gestion des consommations". W La confiance dans les relations familiales, 73–116. Presses universitaires de Rennes, 2020. http://dx.doi.org/10.4000/books.pur.148615.
Pełny tekst źródłaCastiglione, Dario. "Les conceptions de la confiance : du mécanisme social au principe normatif". W La dynamique confiance / méfiance dans les démocraties multinationales, 17–32. Les Presses de l’Université de Laval, 2012. http://dx.doi.org/10.1515/9782763799186-002.
Pełny tekst źródłaVINET, Freddy, i Anne-Marie LEVRAUT. "Principes généraux de la gestion de crise". W Gestion des crises territoriales, 37–62. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9080.ch2.
Pełny tekst źródła"Services de confiance". W Loi type de la CNUDCI sur l'utilisation et la reconnaissance internationale de la gestion de l'identité et des services de confiance, 70–79. United Nations, 2024. http://dx.doi.org/10.18356/9789210028547c011.
Pełny tekst źródła"Services de confiance". W Loi type de la CNUDCI sur l'utilisation et la reconnaissance internationale de la gestion de l'identité et des services de confiance, 18–24. United Nations, 2024. http://dx.doi.org/10.18356/9789210028547c005.
Pełny tekst źródłaMOVAHEDI, Zeinab. "Le déchargement intelligent des calculs dans le contexte du Mobile Cloud Computing". W Gestion et contrôle intelligents des réseaux, 153–78. ISTE Group, 2020. http://dx.doi.org/10.51926/iste.9008.ch6.
Pełny tekst źródłaGatfaoui, Shérazade, i Shérazade Gatfaoui. "Management des services". W Management des services, 178–80. Presses universitaires de Grenoble, 2015. http://dx.doi.org/10.3917/pug.abram.2015.01.0178.
Pełny tekst źródła"La confiance dans l’organisation scolaire autochtone :". W La gestion de l'éducation dans les écoles des communautés autochtones du Québec, 61–82. Presses de l'Université du Québec, 2020. http://dx.doi.org/10.2307/j.ctv1n35cf9.10.
Pełny tekst źródła"Gestion de l’identité". W Loi type de la CNUDCI sur l'utilisation et la reconnaissance internationale de la gestion de l'identité et des services de confiance, 56–69. United Nations, 2024. http://dx.doi.org/10.18356/9789210028547c010.
Pełny tekst źródłaStreszczenia konferencji na temat "Mécanisme de gestion de la confiance"
"Formalisation des politiques de sécurité, gestion de la confiance, management de la sécurité". W 2012 National Days of Network Security and Systems (JNS2). IEEE, 2012. http://dx.doi.org/10.1109/jns2.2012.6249229.
Pełny tekst źródłaRaporty organizacyjne na temat "Mécanisme de gestion de la confiance"
Beaurain, Christophe, Julien Bernard, Iratxe Calvo-Mendieta, Hervé Flanquart, Séverine Frère, Frédéric Gonthier, Anne-Peggy Hellequin i Antoine Le Blanc. Les risques et pollutions industriels sur le territoire dunkerquois: des perceptions à la «concertation». Fondation pour une culture de sécurité industrielle, lipiec 2010. http://dx.doi.org/10.57071/255dkr.
Pełny tekst źródłaDudoit, Alain. Les espaces européens communs de données : une initiative structurante nécessaire et adaptable au Canada. CIRANO, październik 2023. http://dx.doi.org/10.54932/ryht5065.
Pełny tekst źródła