Rozprawy doktorskie na temat „Protection de l'information (informatique) – Aspect médical”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 16 najlepszych rozpraw doktorskich naukowych na temat „Protection de l'information (informatique) – Aspect médical”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Azzi, Rita. "Blockchain Adoption in Healthcare : Toward a Patient Centric Ecosystem". Electronic Thesis or Diss., Institut polytechnique de Paris, 2023. http://www.theses.fr/2023IPPAT053.
Pełny tekst źródłaThe healthcare sector evolves constantly, driven by technological advancement and innovative solutions. From remote patient monitoring to the Internet of Things (IoT), Artificial Intelligence (AI), personalized medicine, mobile health, and electronic records systems, technology has improved patient outcomes and enhanced care delivery. These technologies have shifted the healthcare ecosystem to be more patient-centered, focusing on meeting the patient's needs rather than the needs of the individual organizations within it. However, this transformative shift experienced by the healthcare industry is associated with multiple challenges due to the inherent complexity and fragmentation of the healthcare ecosystem. This dissertation addresses three healthcare ecosystem challenges that significantly impact patients. The first challenge addressed is the problem of counterfeit or falsified drugs that represent a threat to public health, resulting from the vulnerabilities in the pharmaceutical supply chain, notably centralized data management and the lack of transparency. The second challenge addressed is the problem of healthcare data fragmentation that thwarts care coordination and impacts clinical efficiency. This problem results from the dynamic and complex patients' journey in the healthcare system, shaped by their unique health needs and preferences. Patient data are scattered across multiple healthcare organizations within centralized databases and are ruled by policies that hinder data sharing and patients' empowerment over their data. The third challenge addressed is the confidentiality and privacy of healthcare data that, if compromised, shatter the trust relationship between patients and healthcare stakeholders. This challenge results from the healthcare organizations' poor data governance that increases the risk of data breaches and unauthorized access to patient information.The blockchain has emerged as a promising solution to address these critical challenges. It was introduced into the healthcare ecosystem with the promise of enforcing transparency, authentication, security, and trustworthiness. Through comprehensive analysis and case studies, this dissertation assesses the opportunities and addresses the challenges of adopting the blockchain in the healthcare industry. We start with a thorough review of the state of the art covering the blockchain's role in improving supply chain management and enhancing the healthcare delivery chain. Second, we combine theoretical and real-world application studies to develop a guideline that outlines the requirements for building a blockchain-based supply chain. Third, we propose a patient-centric framework that combines blockchain technology with Semantic technologies to help patients manage their health data. Our fourth contribution presents a novel approach to data governance by developing a blockchain-based framework that improves data security and empowers patients to participate actively in their healthcare decisions. In this final contribution, we widen the scope of the proposed framework to include a roadmap for its adoption across diverse domains (banking, education, transportation, and logistics, etc.)
Kassem, Hala. "La protection de la personnalité dans son aspect informationnel au Liban : Enjeux et perspectives". Montpellier 1, 2007. http://www.theses.fr/2007MON10060.
Pełny tekst źródłaSerme, Gabriel. "Modularisation de la sécurité informatique dans les systèmes distribués". Electronic Thesis or Diss., Paris, ENST, 2013. http://www.theses.fr/2013ENST0063.
Pełny tekst źródłaAddressing security in the software development lifecycle still is an open issue today, especially in distributed software. Addressing security concerns requires a specific know-how, which means that security experts must collaborate with application programmers to develop secure software. Object-oriented and component-based development is commonly used to support collaborative development and to improve scalability and maintenance in software engineering. Unfortunately, those programming styles do not lend well to support collaborative development activities in this context, as security is a cross-cutting problem that breaks object or component modules. We investigated in this thesis several modularization techniques that address these issues. We first introduce the use of aspect-oriented programming in order to support secure programming in a more automated fashion and to minimize the number of vulnerabilities in applications introduced at the development phase. Our approach especially focuses on the injection of security checks to protect from vulnerabilities like input manipulation. We then discuss how to automate the enforcement of security policies programmatically and modularly. We first focus on access control policies in web services, whose enforcement is achieved through the instrumentation of the orchestration mechanism. We then address the enforcement of privacy protection policies through the expert-assisted weaving of privacy filters into software. We finally propose a new type of aspect-oriented pointcut capturing the information flow in distributed software to unify the implementation of our different security modularization techniques
Serme, Gabriel. "Modularisation de la sécurité informatique dans les systèmes distribués". Thesis, Paris, ENST, 2013. http://www.theses.fr/2013ENST0063/document.
Pełny tekst źródłaAddressing security in the software development lifecycle still is an open issue today, especially in distributed software. Addressing security concerns requires a specific know-how, which means that security experts must collaborate with application programmers to develop secure software. Object-oriented and component-based development is commonly used to support collaborative development and to improve scalability and maintenance in software engineering. Unfortunately, those programming styles do not lend well to support collaborative development activities in this context, as security is a cross-cutting problem that breaks object or component modules. We investigated in this thesis several modularization techniques that address these issues. We first introduce the use of aspect-oriented programming in order to support secure programming in a more automated fashion and to minimize the number of vulnerabilities in applications introduced at the development phase. Our approach especially focuses on the injection of security checks to protect from vulnerabilities like input manipulation. We then discuss how to automate the enforcement of security policies programmatically and modularly. We first focus on access control policies in web services, whose enforcement is achieved through the instrumentation of the orchestration mechanism. We then address the enforcement of privacy protection policies through the expert-assisted weaving of privacy filters into software. We finally propose a new type of aspect-oriented pointcut capturing the information flow in distributed software to unify the implementation of our different security modularization techniques
Marliac-Négrier, Claire. "La protection des données nominatives informatiques en matière de recherche médicale". Clermont-Ferrand 1, 1999. http://www.theses.fr/1999CLF10211.
Pełny tekst źródłaThe protection of named personal information, direct or indirect, was the object of a passionate debate in France during the 70’s, as information technology advanced, and in so doing exposed devious and aberrant practices. This led to the adoption of the law 6th January 1978 called “Informatique et libertés”. If information technology has allowed uncontestable progress in the treatment and stockage of personal information. The health services, in particular have invested heavily in this technology, especially in research and development, and here the information is particularly sensitive. What are the protections and are they sufficient? There is the problem. The law of 1978 was amended by the law 1st July 1994 so as so legally allow the communication of specific medical information, normally covered by the medical secret, to researchers. It appears that the legislation is insufficient and that this will become even more apparent with the application of the European directive n° 95/46 relative to the protection of the individual with regards to personal information and its free circulation. We propose the solutions reconciling the necessity of medical research and the protection of the individual, by valorizing an active role for the individual concerned
Philippe, Cécile. "The economics of cryptography : an essay on information". Paris 9, 2003. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=2003PA090035.
Pełny tekst źródłaFaria, Maria Paula Marçal Grilo Lobato de. "Données génétiques informatisées : un nouveau défi à la protection du droit à la confidentialité des données personnelles de santé". Bordeaux 4, 1996. http://www.theses.fr/1996BOR40030.
Pełny tekst źródłaAfter a description of the dangers posed to human privacy by "new genetics" and informatics, this thesis leads to the conclusion, by means of an analysis of the portuguese juridical framework, in a compared law perspective, of the right to confidentiality, medical secrecy and personal data protection laws, that contemporary law needs a special legal statute to rule the confidentiality of personal health genetic data without which fundamental human rights will be in threat
Olech, Valérie. "Le secret médical et les technologies de l’information et de la communication". Thesis, Université de Lorraine, 2019. http://docnum.univ-lorraine.fr/ulprive/DDOC_T_2019_0343_OLECH.pdf.
Pełny tekst źródłaIs there something to add about “medical secrecy”? Scholar disputes over the professional secrecy foundations are supposed to be dried up, since it is now limited to the patient’s interest alone, which would explain the generalization of medical secrecy to all persons of the care system. Yet, when it comes to the matter of the relationship between information and communications technologies and medical secrecy, the scholar discourse suffer from a lake of clarity. What is the impact of the information and communications technologies on the “medical secrecy”? It is a question worth asking by exploring different analytical frameworks from those traditionally employed. The latter is about studying the structural movement according to which the medical secrecy is at the same time “protected” by Law in face of information and communications technologies and “affected” in Law and by the technologies
Lacoste-Vaysse, Guillaume. "La protection des données de santé à caractère personnel : pour la reconnaissance des droits du patient". Thesis, Toulouse 1, 2016. http://www.theses.fr/2016TOU10047/document.
Pełny tekst źródłaPersonal data is omnipresent on the internet and their economic importance is growing. For the information society services such as search engines, social networks, or online shopping sites, they have become indispensable. These services appear as essentially free for users, but actually have a particular economic model: the monetization of personal data of users in exchange for free access. The new data processing necessity an original governance by law
Huynh, Nghi. "Vérification et validation de politiques de contrôle d'accès dans le domaine médical". Thesis, Paris Est, 2016. http://www.theses.fr/2016PESC1042/document.
Pełny tekst źródłaIn healthcare, data digitization and the use of the Electronic Health Records (EHR) offer several benefits, such as reduction of the space occupied by data, or the ease of data search or data exchanges. IT systems must gradually act as the archivists who manage the access over sensitive data. Those have to be checked to be consistent with patient privacy wishes, hospital rules, and laws and regulations.SGAC, or Solution de Gestion Automatisée du Consentement, aims to offer a solution in which access to patient data would be based on patient rules, hospital rules and laws. However, the freedom granted to the patient can cause several problems: conflicts, hiding of the needed data to heal the patient or simply data-capture error. Therefore, verification and validation of policies are crucial: to conduct this verification, formal methods provide reliable ways to verify properties like proofs or model checking.This thesis provides verification methods applied on SGAC for the patient: it introduces the formal model of SGAC, verification methods of properties such as data reachability or hidden data detection. To conduct those verification in an automated way, SGAC is modelled in B and Alloy; these different models provide access to the tools Alloy and ProB, and thus, automated property verification with model checking
Tatsos, Patrice. "Utilisation d’une ontologie différentielle pour l’élaboration de licences d’exploitation de contenus numériques : du formalisme à la transparence cognitive". Reims, 2007. http://theses.univ-reims.fr/exl-doc/GED00000732.pdf.
Pełny tekst źródłaDigital Rigths Management (DRM) systems appear quite recently. They aim to use the rights expression languages (REL) to express and manage the rights of use for exchanging contents. Each DRM has his own REL. Unfortunatly, those differents languages are not interoperables,that is to say that the rightholders have to express for one content a license for each device (each device has his own DRM : PCuse Windows DRM, mobiles use OMA DRM, Ipod use Apple DRM…). To help rihgtholders to express liceses only once, we use a differential ontology to define a REL with is generic. This ontology of licenses is then used to translate the licences expressed by our REL into RELs. This thesis deals about the way to use the ontolgy (wich is a formal object) to generate licenses. We start from a formal structure to define a dynamic dialog with users. Using the semantics, and the differential ontology principles of the ontology, we infor and lead the user, so he can express his licence and translate it into the REL chose
Preuss-Laussinotte, Sylvia. "Les fichiers et les étrangers au coeur des nouvelles politiques de sécurité". Paris 10, 1998. http://www.theses.fr/1998PA100014.
Pełny tekst źródłaRossi, Julien. "Protection des données personnelles et droit à la vie privée : enquête sur la notion controversée de « donnée à caractère personnel »". Thesis, Compiègne, 2020. http://www.theses.fr/2020COMP2549.
Pełny tekst źródłaInternet and digital information and communication technologies in general are often portrayedas a threat to privacy. This gives rise to many debates, both in the media and among decisionmakers. The Snowden revelations, in 2013, followed by the adoption in 2016 of the General Data Protection Regulation (GDPR), have moved these discussions under the spotlight of the publicsphere.The research presented in this dissertation was born out of three questions: can we define what“privacy” is? Is there any consensus on its definition? And does this consensus change with theevolution of the technical milieu transforming our ways of communicating, and by doing so, theway in which our privacy can be intruded upon? By defining “privacy” as the object which is protected by normative texts – laws, court decisions,techno-political standards of the Internet – protecting the right to privacy, it becomes possible toconduct an empirical study of how it evolved and how it has been a topic of contention. Data protection law emerged in Europe during the 1970’s. Its aim was to protect a “privacy” that was perceived as under threat by the advent of computers. Currently, the GDPR, or somedocuments adopted by standards-settings organisations like the Internet Engineering Task Force(IETF) or the World Wide Web Consortium (W3C), are written with the intention that they protect this privacy through a set of rules and principles referred to as “data protection”, that apply to “personal data”. The legal definitions of this notion produced by political institutions and those crafted instandards-settings bodies are identical. Furthermore, the study of the genealogy of data protection reveals that computer scientists have played a pivotal role in the invention of the principles that “data protection” still relies on, for instance in the GDPR. The analysis of the controversies that took place in the shaping of these rules shows that the notion of “personal data” written down in the normative texts we analysed essentially reflects the beliefs system of a coalition inspired by liberal utilitarian ideals, valuing individual autonomy and granting importance to the respect of one’s consent. This framing of “privacy” has become the paradigm on the field. Other theories, such as those defining “privacy” as a space bound by collectively defined borders protecting it from the public eye, or those advocating the recognition of private property rights on personal data, have been less successful in shaping policy out comes.The advent and spread of networked computers have not directly determined the evolution of theobject that is protected by the right to privacy. It is, rather, the perceptions a group of actors had of computers, that caused such an evolution. Convinced that their liberal conception of privacy issocially valuable, they managed to craft a new legal category during the 1970’s in Europe: the right to the protection of personal data. The GDPR, adopted in 2016, just like Web standards aiming at enhancing the protection of privacy, rely those same principles that were invented during these early debates. Therefore, it can be said that the emergence of computers has indeed, but indirectly, been a triggering factor in the evolution of “privacy” defined as the object protected by the right to privacy
Seguin, Cédric. "Déploiement d'applications d'assistance dans un environnement d'aide au handicap". Thesis, Lorient, 2015. http://www.theses.fr/2015LORIS367/document.
Pełny tekst źródłaNowadays, the problem of care for people with disabilities is a major concern. Many studies prove that handicaps strongly impact modern society, economically and socially. Dependence, resulting in disability situations, is the inability to perform alone the tasks of daily living. A specialized assistance or even hospitalization, in the most advanced cases, may become necessary. Politicians were not deceived by making this issue a priority, particularly in France where the government has provided large sums of money. The World Health Organization, in its latest definition of disability says that disability is situational and that a suitable environment can compensate for the inability and correct the dependency. We can wonder, to what degree, can technology bring in the life of every day, a certain degree of comfort and independence for disabled people? Today, technology brings through intelligent houses, pervasive systems and home automation, the necessary resources for people to gain autonomy and stay longer at home. These solutions are based on specialized support services adapted to the uniqueness of the patient's pathology. Thus, a patient with physical disabilities could have an environment control solution while a patient with cognitive impairment may compensate for his disability through behavior analysis solutions. We offer a healthcare solution combining the two fields of action, to compensate for situations of multiple handicaps. To ensure independence, living comfort, security, health surveillance and home care for disabled people, algorithms require a lot of processing resources. The lack of processing devices can slow or even block the deployment of different assistive tasks and question considerably the user experience and therefore the acceptance of the solution. Neglecting the impact of resources for deploying can lead to inconvenient situations, even dangerous in the case of vital emergency. Can we really offer the best possible assistance service if our infrastructure does not allow its achievement? To address this problem, designers oversize the solution. In other words, extra dedicated and expensive equipments are installed in the person's environment. This attitude, although widely used in the industry, does not respect the recommendations of ambient assisted living, which aim to reduce the cost criteria and intrusiveness. Modern lifestyles imply that today's home, without any particular modifications, is already full of home-automation and electronic devices with unused capacities. We offer a resource modeling approach to highlight their abilities. However, be aware of these capabilities is not enough, the system also need to know how to manage them to facilitate the deployment of assistive services. Indeed, if the system can properly manage the utilization of the capabilities of one resource, the joint optimization of several resources, at the same, time is not enough controlled. We have set up a contextual deployment flow which, thanks to the knowledge of the environment and resources, can deploy a service on any devices capable of carrying out the operation. A distribution of the processing load, uniformly, helps to ensure dependability of our solution, by avoiding resource bottlenecks and overall system overload
Etien-Gnoan, N'Da Brigitte. "L'encadrement juridique de la gestion électronique des données médicales". Thesis, Lille 2, 2014. http://www.theses.fr/2014LIL20022/document.
Pełny tekst źródłaThe electronic management of medical data is as much in the simple automated processing of personal data in the sharing and exchange of health data . Its legal framework is provided both by the common rules to the automated processing of all personal data and those specific to the processing of medical data . This management , even if it is a source of economy, creates protection issues of privacy which the French government tries to cope by creating one of the best legal framework in the world in this field. However , major projects such as the personal health record still waiting to be made and the right to health is seen ahead and lead by technological advances . The development of e-health disrupts relationships within one dialogue between the caregiver and the patient . The extension of the rights of patients , sharing responsibility , increasing the number of players , the shared medical confidentiality pose new challenges with which we must now count. Another crucial question is posed by the lack of harmonization of legislation increasing the risks in cross-border sharing of medical
Carugati, Christophe. "Competition law and economics of big data : a new competition rulebook". Thesis, Paris 2, 2020. http://www.theses.fr/2020PA020003.
Pełny tekst źródłaThis thesis addresses Big Data issues in competition law in three chapters. Chapter one proposes new economic tools to define the relevant market and the market power in the data-driven economy. It argues the need to reform the relevant market and the market power by considering new tools and a menu of key features relevant to the market power. Chapter two proposes new law and economics analysis for data-driven antitrust and merger practices. It considers debated topics related to the integration of privacy in the assessment of antitrust and merger practices, algorithmic collusion and pre-emptive mergers. It argues the need to integrate privacy in any data-driven antitrust and merger practices as data imply necessarily privacy and data protection issues. Finally, chapter three proposes to regulate the digital economy. It demonstrates that the economy is highly concentrated and that the markets cannot correct themselves market failures. It analyzes recommendations from the government reports (Furman et al, Crémer et al, Schallbruch et al, ACCC report, and Stigler report) and It proposes and discusses other original proposals