Gotowa bibliografia na temat „Protection des informations biométriques”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Protection des informations biométriques”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Protection des informations biométriques"
Rameix, Gérard. "La protection des informations privilégiées". Revue internationale de droit comparé 71, nr 1 (2019): 107–22. http://dx.doi.org/10.3406/ridc.2019.21036.
Pełny tekst źródłaChoi, Kwan Sig. "Personal Information Protection Crisis Management in Big Data". Crisis and Emergency Management: Theory and Praxis 17, nr 11 (30.11.2021): 95–108. http://dx.doi.org/10.14251/crisisonomy.2021.17.11.95.
Pełny tekst źródłaKumar, S. Martin Selva, Dr S. Kevin Andrews i Dr N. Jayashri. "Finite Time Stabilization in the Production and its Informations Protection". International Journal of Research Publication and Reviews 5, nr 4 (28.04.2024): 9812–19. http://dx.doi.org/10.55248/gengpi.5.0424.1139.
Pełny tekst źródłaJiang, Yan Lan, Xiao Rui Liang i Shi Yong Wu. "Nanotechnology Applications in the Field of Ship Protection". Materials Science Forum 694 (lipiec 2011): 239–43. http://dx.doi.org/10.4028/www.scientific.net/msf.694.239.
Pełny tekst źródłaHyoungSuk Ko. "A Study on the expansion of the Informations Protection Certification Systems". Journal of Law and Politics research 16, nr 2 (czerwiec 2016): 411–41. http://dx.doi.org/10.17926/kaolp.2016.16.2.411.
Pełny tekst źródłaJouanno, Aubrie. "Un mandat de surveillance étendu. Une analyse des effets de la pauvreté sur la surexposition au signalement à la maternité et à l’école". Revue française des affaires sociales, nr 3 (5.12.2023): 49–72. http://dx.doi.org/10.3917/rfas.233.0049.
Pełny tekst źródłaSaettel, Camille. "Les secrets d’affaires : transposition en droit luxembourgeois de la directive européenne 2016/943". Pin Code N° 2, nr 2 (28.07.2019): 1–10. http://dx.doi.org/10.3917/pinc.002.0001.
Pełny tekst źródłaLussier, Louise. "Le régime québécois d'indemnisation des victimes d'immunisation: problèmes d'application". Les Cahiers de droit 31, nr 3 (12.04.2005): 849–69. http://dx.doi.org/10.7202/043039ar.
Pełny tekst źródłaEschwège, P. "Quelles sont les informations fournies par la transplantation rénale sur la protection rénale ?" Annales Françaises d'Anesthésie et de Réanimation 24, nr 2 (luty 2005): 182–93. http://dx.doi.org/10.1016/j.annfar.2004.12.026.
Pełny tekst źródłaBrett, Raphaël. "Le renforcement de la ‘démocratie environnementale’ par le droit international : décryptage de l’accord d’Escazú". Annuaire français de droit international 66, nr 1 (2020): 693–708. http://dx.doi.org/10.3406/afdi.2020.5488.
Pełny tekst źródłaRozprawy doktorskie na temat "Protection des informations biométriques"
Bardou, Sophie. "Les traitements de données biométriques en entreprise". Thesis, Montpellier 1, 2010. http://www.theses.fr/2010MON10031/document.
Pełny tekst źródłaBiometry brings together computing techniques that enable the identification of individuals on the basis of their biological, physical appearance and/or behavioral characteristics. Although firstly reserved for the legal system/judiciary domain, biometry tends to be generalized in all spheres of people life. Recently, biometry has also been used in companies who are always receptive to new technologies. Thus, the introduction of identifying devices such as these into a company life has to be the subject of corporate discussions between the managing teams and staff representatives. Indeed, such technologies are often compared to video surveillance, RFID chips, GPS data … and they can lead to the spying of employees if their uses are not well supervised. In the absence of specific laws, the legislator has given the CNIL the abilities to establish the requirements of eligibility of this technology usage within the companies. The "liberty and computing" legislation is then combined with the labor laws in order to apply common principles such as the finality, the proportionality, the loyalty, the transparency of information and employee consents
Mtibaa, Aymen. "Towards robust and privacy-preserving speaker verification systems". Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS002.
Pełny tekst źródłaSpeaker verification systems are a key technology in many devices and services like smartphones, intelligent digital assistants, healthcare, and banking applications. Additionally, with the COVID pandemic, access control systems based on fingerprint scanners or keypads increase the risk of virus propagation. Therefore, companies are now rethinking their employee access control systems and considering touchless authorization technologies, such as speaker verification systems.However, speaker verification system requires users to transmit their recordings, features, or models derived from their voice samples without any obfuscation over untrusted public networks which stored and processed them on a cloud-based infrastructure. If the system is compromised, an adversary can use this biometric information to impersonate the genuine user and extract personal information. The voice samples may contain information about the user's gender, accent, ethnicity, and health status which raises several privacy issues.In this context, the present PhD Thesis address the privacy and security issues for speaker verification systems based on Gaussian mixture models (GMM), i-vector, and x-vector as speaker modeling. The objective is the development of speaker verification systems that perform biometric verification while preserving the privacy and the security of the user. To that end, we proposed biometric protection schemes for speaker verification systems to achieve the privacy requirements (revocability, unlinkability, irreversibility) described in the standard ISO/IEC IS~24745 on biometric information protection and to improve the robustness of the systems against different attack scenarios
Grèzes, Vincent. "Intelligence Economique et Stratégique : protection et Exploitation des Informations Légales en Europe". Thesis, Lyon 3, 2014. http://www.theses.fr/2014LYO30037.
Pełny tekst źródłaThis research focuses on the identification of legal information available on businesses in Europe, the identification of measures able to protect it, and the identification of methods able to exploit it in an economic and strategic intelligence process. Legal information is understood as structural and accounting information about enterprises, subject to legal disclosure requirement. The results of this study present a repository of legal information on companies in Europe, as well as Switzerland and Norway, and the analysis of different options regarding the protection, the collection and the use of this information in an economic and strategic intelligence process
Ichikawa, Kotaro. "Studies on behavioral ecology and protection measures of the dugongs based on analyses of marine acoustical informations". 京都大学 (Kyoto University), 2007. http://hdl.handle.net/2433/135985.
Pełny tekst źródłaMarot, Pierre-Yves. "Les données et informations à caractère personnel : essai sur la notion et ses fonctions". Nantes, 2007. http://www.theses.fr/2007NANT4012.
Pełny tekst źródłaWhereas the primacy of the person is strongly stated by law, the splitting of the, legal sources devoted to the data and information pertaining to the person (personal data. Nominative information, privacy. . . ) is likely to set the dismantling of the person into as many specific legal statuses as there are data and information. The notion of privacy highly participates to this danger because, if its protection means the protection of an important amount of data and information, their nature doesn't indicate what legal status is to be applied in each case. In this context, it is not surprising to see courts allowing the modification of the civil status (names, surnames, sex. . . ) on the paradoxical rationale of the right of privacy, even if it in large parts depends on state decisions. Facing these conceptual contradictions, we note the emergence of a category of personal data and information which as common criterion holds the identification of the person thus allowed. Starting from this functional category, it becomes possible to explore its practical implication and to give an account of it. As it appears, if the use of personal data and information remains exceptional, it becomes massive as soon as public interest are concerned (e. G. Penal system, public health and public information). It is therefore advised to restore in all, its fullness. The principle of protection for personal data and information by strictly appreciating its exemptions and by relying on the necessary safeguard unavailability provides
Anstett, Michel. "L'enquête sociale en protection de l'enfance : techniques utilisées et influences des informations fournies par l'environnement sur le diagnostic révélant l'inadaptation". Paris 8, 1987. http://www.theses.fr/1987PA080169.
Pełny tekst źródłaWe will choose the methodological approach valuing the interactive aspects of several parameters which intervene in the social investigation practices. We suppose that the last in a privileged objet from and around which there can be several social and institutional practices observed. Consequently, the social investigation becomes : 1. An act of social service assistance based on listening and respecting the notions of the individual, 2. A judicial tool of information and of verification whose invention is in itself historically dated, 3. A method of investigation in which the interview techniques and certain conceptions of the observation approach express themselves, 4. A practice through which it is possible to retrace the channels of report and discover the origins of the inadaptility. Presented under the forme of four distinct but complementary parts, our study approaches this four stages in a dialectic way. Some importants facts : the report is not only of professional use, but is also used in an active way by the social corps. But, also, it is used by the professionals as an internal regulation. The inquiry investigation, in spite of its technicality and recours to the human sciences, remains well defined by the procedurial logic of the law. The social inquiry is not the unity of something more vast, and cannot be analysed without an observation of the whole of the social field
Anstett, Michel. "L'Enquête sociale en protection de l'enfance techniques utilisées et influence des informations fournies par l'environnement sur le diagnostic révélant l'inadaptation /". Lille 3 : ANRT, 1988. http://catalogue.bnf.fr/ark:/12148/cb37602267p.
Pełny tekst źródłaMorel, Victor. "Enhancing transparency and consent in the internet of things". Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI073.
Pełny tekst źródłaIn an increasingly connected world, the Internet permeates every aspect of our lives. The number of devices connected to the global network is rising, with prospects foreseeing 75 billions devices by 2025. The Internet of Things envisioned twenty years ago is now materializing at a fast pace, but this growth is not without consequence. The increasing number of devices raises the possibility of surveillance to a level never seen before. A major step has been taken in 2018 to safeguard privacy, with the introduction of the General Data Protection Regulation (GDPR) in the European Union. It imposes obligations to data controllers on the content of information about personal data collection and processing, and on the means of communication of this information to data subjects. This information is all the more important that it is required for consent, which is one of the legal grounds to process personal data. However, the Internet of Things can pose difficulties to implement lawful information communication and consent management. The tension between the requirements of the GDPR for information and consent and the Internet of Things cannot be easily solved. It is however possible. The goal of this thesis is to provide a solution for information communication and consent management in the Internet of Things from a technological point of view. To do so, we introduce a generic framework for information communication and consent management in the Internet of Things. This framework is composed of a protocol to communicate and negotiate privacy policies, requirements to present information and interact with data subjects, and requirements over the provability of consent. We support the feasibility of this generic framework with different options of implementation. The communication of information and consent through privacy policies can be implemented in two different manners: directly and indirectly. We then propose ways to implement the presentation of information and the provability of consent. A design space is also provided for systems designers, as a guide for choosing between the direct and the indirect implementations. Finally, we present fully functioning prototypes devised to demonstrate the feasibility of the framework’s implementations. We illustrate how the indirect implementation of the framework can be developed as a collaborative website named Map of Things. We then sketch the direct implementation combined with the agent presenting information to data subjects under the mobile application CoIoT
Ibarrondo, Luis Alberto. "Privacy-preserving biometric recognition systems with advanced cryptographic techniques". Electronic Thesis or Diss., Sorbonne université, 2023. https://theses.hal.science/tel-04058954.
Pełny tekst źródłaDealing with highly sensitive data, identity management systems must provide adequate privacy protection as they leverage biometrics technology. Wielding Multi-Party Computation (MPC), Homomorphic Encryption (HE) and Functional Encryption (FE), this thesis tackles the design and implementation of practical privacy-preserving biometric systems, from the feature extraction to the matching with enrolled users. This work is consecrated to the design of secure biometric solutions for multiple scenarios, putting special care to balance accuracy and performance with the security guarantees, while improving upon existing works in the domain. We go beyond privacy preservation against semi-honest adversaries by also ensuring correctness facing malicious adversaries. Lastly, we address the leakage of biometric data when revealing the output, a privacy concern often overlooked in the literature. The main contributions of this thesis are: • A new face identification solution built on FE-based private inner product matching mitigating input leakage. • A novel efficient two-party computation protocol, Funshade, to preserve the privacy of biometric thresholded distance metric operations. • An innovative method to perform privacy-preserving biometric identification based on the notion of group testing named Grote. • A new distributed decryption protocol with collaborative masking addressing input leakage, dubbed Colmade. • An honest majority three-party computation protocol, Banners, to perform maliciously secure inference of Binarized Neural Networks. • A HE Python library named Pyfhel, offering a high-level abstraction and low-level functionalities, with applications in teaching
Gerl, Armin. "Modelling of a privacy language and efficient policy-based de-identification". Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI105.
Pełny tekst źródłaThe processing of personal information is omnipresent in our datadriven society enabling personalized services, which are regulated by privacy policies. Although privacy policies are strictly defined by the General Data Protection Regulation (GDPR), no systematic mechanism is in place to enforce them. Especially if data is merged from several sources into a data-set with different privacy policies associated, the management and compliance to all privacy requirements is challenging during the processing of the data-set. Privacy policies can vary hereby due to different policies for each source or personalization of privacy policies by individual users. Thus, the risk for negligent or malicious processing of personal data due to defiance of privacy policies exists. To tackle this challenge, a privacy-preserving framework is proposed. Within this framework privacy policies are expressed in the proposed Layered Privacy Language (LPL) which allows to specify legal privacy policies and privacy-preserving de-identification methods. The policies are enforced by a Policy-based De-identification (PD) process. The PD process enables efficient compliance to various privacy policies simultaneously while applying pseudonymization, personal privacy anonymization and privacy models for de-identification of the data-set. Thus, the privacy requirements of each individual privacy policy are enforced filling the gap between legal privacy policies and their technical enforcement
Książki na temat "Protection des informations biométriques"
Rudin, Beat, i Baeriswyl Bruno. Praxiskommentar zum Informations- und Datenschutzgesetz des Kantons Zürich (IDG). Zürich: Schulthess, 2012.
Znajdź pełny tekst źródłaGermany) Herbstakademie (11th 2010 Munich. Digitale Evolution: Herausforderungen für das Informations- und Medienrecht ; [Tagungsband Herbstakademie 2010]. Edewecht: Oldenburger Verlag für Wirtschaft, Informatik und Recht (OlWIR), 2010.
Znajdź pełny tekst źródłaProperty, Canada Movable Cultural. Designation of institutions and public authorities : guidelines & information =: Désignation des administrations et des établissements : lignes directrices et informations. Ottawa, Ont: Dept. of Communications = Ministère des communications, 1990.
Znajdź pełny tekst źródłaWolfgang, Zankl, i Feiler Lukas, red. Auf dem Weg zum Überwachungsstaat?: Neue Überwachungsmassnahmen im Bereich der Informations- und Kommunikationstechnologie. Wien: Facultas.wuv, 2009.
Znajdź pełny tekst źródłaRojas, Fernando Martínez. Habeas data. Colombia: Ediciones Jurídicas Gustavo Ibáñez, 1999.
Znajdź pełny tekst źródłaUNESCO-Kommission, Nationale Schweizerische. Die UNESCO-Konvention 1970 und ihre Anwendung: Standortbestimmung und Perspektiven : Beiträge der Informations- und Austauschtagung vom 1. Juni 2010 in Bern = La convention UNESCO de 1970 et sa mise en application : etat des lieux et perspectives : les textes de la journee d'information et d'echange du 1 juin 2010 a Berne. Zürich: Dike, 2011.
Znajdź pełny tekst źródłaMYLY, E. L. EL. Informations Personnelles Confidentielles: Un Carnet de Protection des Informations Personnelles / Conserve Toutes Vos Informations Confidentielles 110 Page. Independently Published, 2021.
Znajdź pełny tekst źródłaWolfgang, Zankl, i Feiler Lukas, red. Auf dem Weg zum Überwachungsstaat?: Neue Überwachungsmassnahmen im Bereich der Informations- und Kommunikationstechnologie. Wien: Facultas.wuv, 2009.
Znajdź pełny tekst źródłaInformations sur les ressources en environnement dans les îles de l'océan Indien: Comores, Madagascar, Maurice, Réunion, Seychelles : personnes ressources, institutions et organismes, projets ou activités, bibliographies. Wyd. 2. Antananarivo, Madagascar: REDES OI, 2001.
Znajdź pełny tekst źródłaFAFA, Lala LALA. Journal de Bord de Private Password Tracker: Un Carnet de Protection des Informations Personnelles / Conserve Tous Vos Mots de Passe Privés. Independently Published, 2022.
Znajdź pełny tekst źródłaCzęści książek na temat "Protection des informations biométriques"
Tanzini, Lorenzo. "«Situm in loco alto et forti». Una controversia del vescovo Andrea de’ Mozzi per il monastero di San Miniato". W La Basilica di San Miniato al Monte di Firenze (1018-2018), 151–73. Florence: Firenze University Press, 2021. http://dx.doi.org/10.36253/978-88-5518-295-9.09.
Pełny tekst źródłaGallot, Éric. "Outil 15. Les règles de protection des informations classifiées". W La boîte à outils de la sécurité économique, 54–57. Dunod, 2015. http://dx.doi.org/10.3917/dunod.moine.2015.01.0054.
Pełny tekst źródłaAbirov, Rustam, i Mirzakhid Miralimov. "On Mitigation of Damages on Landslide Prone Regions of Uzbekistan". W Advances in Transdisciplinary Engineering. IOS Press, 2023. http://dx.doi.org/10.3233/atde230856.
Pełny tekst źródłaBoobalan, P., K. Gunasekar, P. Thirumoorthy i J. Senthil. "An Introduction to Deepfakes on Cryptographic Image Security". W Advances in Multimedia and Interactive Technologies, 72–81. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-6060-3.ch006.
Pełny tekst źródła"Titelei/Inhaltsverzeichnis". W Das öffentliche Recht vor den Herausforderungen der Informations- und Kommunikationstechnologien jenseits des Datenschutzes | Information and Communication Technologies Challenging Public Law, Beyond Data Protection | Le droit public au défi des technologies de l'information et de la communication, au-delà de la protection des donnés, redaktorzy Diana-Urania Galetta i Jacques Ziller, 1–14. Nomos Verlagsgesellschaft mbH & Co. KG, 2018. http://dx.doi.org/10.5771/9783845294933-1.
Pełny tekst źródłaGaletta, Diana-Urania. "Information and Communication Technology and Public Administration: through the Looking Glass". W Das öffentliche Recht vor den Herausforderungen der Informations- und Kommunikationstechnologien jenseits des Datenschutzes | Information and Communication Technologies Challenging Public Law, Beyond Data Protection | Le droit public au défi des technologies de l'information et de la communication, au-delà de la protection des donnés, 117–30. Nomos Verlagsgesellschaft mbH & Co. KG, 2018. http://dx.doi.org/10.5771/9783845294933-117.
Pełny tekst źródłaSchneider, Jens-Peter. "Bausteine eines Datenverkehrsrechts für die europäische Verwaltung". W Das öffentliche Recht vor den Herausforderungen der Informations- und Kommunikationstechnologien jenseits des Datenschutzes | Information and Communication Technologies Challenging Public Law, Beyond Data Protection | Le droit public au défi des technologies de l'information et de la communication, au-delà de la protection des donnés, 131–42. Nomos Verlagsgesellschaft mbH & Co. KG, 2018. http://dx.doi.org/10.5771/9783845294933-131.
Pełny tekst źródłaCarullo, Gherardo. "Government in the digital era: can we do more with less?" W Das öffentliche Recht vor den Herausforderungen der Informations- und Kommunikationstechnologien jenseits des Datenschutzes | Information and Communication Technologies Challenging Public Law, Beyond Data Protection | Le droit public au défi des technologies de l'information et de la communication, au-delà de la protection des donnés, 143–52. Nomos Verlagsgesellschaft mbH & Co. KG, 2018. http://dx.doi.org/10.5771/9783845294933-143.
Pełny tekst źródłaLosano, Mario G. "Die Transparenz im öffentlichen Recht – Drei Beispiele eines schwer erreichbaren Ziels". W Das öffentliche Recht vor den Herausforderungen der Informations- und Kommunikationstechnologien jenseits des Datenschutzes | Information and Communication Technologies Challenging Public Law, Beyond Data Protection | Le droit public au défi des technologies de l'information et de la communication, au-delà de la protection des donnés, 15–34. Nomos Verlagsgesellschaft mbH & Co. KG, 2018. http://dx.doi.org/10.5771/9783845294933-15.
Pełny tekst źródłaAuby, Jean-Bernard. "Contrôle de la puissance publique et gouvernance par algorithme". W Das öffentliche Recht vor den Herausforderungen der Informations- und Kommunikationstechnologien jenseits des Datenschutzes | Information and Communication Technologies Challenging Public Law, Beyond Data Protection | Le droit public au défi des technologies de l'information et de la communication, au-delà de la protection des donnés, 153–66. Nomos Verlagsgesellschaft mbH & Co. KG, 2018. http://dx.doi.org/10.5771/9783845294933-153.
Pełny tekst źródłaStreszczenia konferencji na temat "Protection des informations biométriques"
Vasiljević, Zoran, i Dragana Vasiljević. "BANKARSKA TAJNA – GRANICE ZAŠTITE". W 14 Majsko savetovanje. University of Kragujevac, Faculty of Law, 2018. http://dx.doi.org/10.46793/xivmajsko.999v.
Pełny tekst źródłaPirinu, Andrea, Vincenzo Bagnolo, Raffaele Argiolas i Marco Utzeri. "Metodologie integrate per la conoscenza, la tutela e la rappresentazione dell’architettura militare storica. Sistemi costruttivi e percorsi voltati lungo i bastioni occidentali di Cagliari (Sardegna, Italia)". W FORTMED2020 - Defensive Architecture of the Mediterranean. Valencia: Universitat Politàcnica de València, 2020. http://dx.doi.org/10.4995/fortmed2020.2020.11378.
Pełny tekst źródłaMoise, Andrei emil. "E-LEARNING AND MILITARY RULES ACROSS BATTLEFIELDS". W eLSE 2013. Carol I National Defence University Publishing House, 2013. http://dx.doi.org/10.12753/2066-026x-13-016.
Pełny tekst źródłaRaporty organizacyjne na temat "Protection des informations biométriques"
Kaboré, Gisele. Etude qualitative sur le mariage précoce des adolescentes: Leur vécu, leurs besoins en matière d'éducation, de santé de la reproduction et d'opportunités socio-économiques. Population Council, 2009. http://dx.doi.org/10.31899/pgy20.1002.
Pełny tekst źródła