Gotowa bibliografia na temat „Respectueux de la vie privée”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Respectueux de la vie privée”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Respectueux de la vie privée"
Christophe, de la Mardière. "Le mythe de l’unicité de l’impôt". Gestion & Finances Publiques, nr 1 (styczeń 2021): 29–34. http://dx.doi.org/10.3166/gfp.2021.1.006.
Pełny tekst źródłaThériault, Sophie, i David Robitaille. "Les droits environnementaux dans la Charte des droits et libertés de la personne du Québec : Pistes de réflexion". McGill Law Journal 57, nr 2 (7.02.2012): 211–65. http://dx.doi.org/10.7202/1007816ar.
Pełny tekst źródłaZeggagh, J., L. Gourmand, P. Duan, F. Dautil, N. Divet, C. Monteil, M. Lafaurie i L. Luong Nguyen. "« BriserLaChaine.org » : conception d’un outil digital de contact tracing des personnes à risque d’infection au SARS-CoV-2 respectueux de la vie privée". Médecine et Maladies Infectieuses 50, nr 6 (wrzesień 2020): S65. http://dx.doi.org/10.1016/j.medmal.2020.06.126.
Pełny tekst źródłaNagy, Eszter. "A Visiones Georgii kéziratai az altzellai apátság könyvtárában, avagy Krizsafán fia György látomásainak recepciója a cisztercieknél". Magyar Könyvszemle 136, nr 1 (24.10.2020): 1–22. http://dx.doi.org/10.17167/mksz.2020.1.1-22.
Pełny tekst źródłaParini, Lorena. "Vie privée et vie publique". Langage et société 105, nr 3 (2003): 69. http://dx.doi.org/10.3917/ls.105.0069.
Pełny tekst źródłaLebrun, Pierre-Brice. "La vie privée". Empan 100, nr 4 (2015): 168. http://dx.doi.org/10.3917/empa.100.0168.
Pełny tekst źródłaMeltz, Romain. "Vie professionnelle, vie privée : le brouillage". Sciences Humaines N° 266, nr 1 (1.01.2015): 19. http://dx.doi.org/10.3917/sh.266.0019.
Pełny tekst źródłaJennane, Abdelillah. "Vie Privée , Vie Professionnelle : Quelle Conciliation ?" Economia, nr 26 (luty 2016): 47–49. http://dx.doi.org/10.12816/0025610.
Pełny tekst źródłaCassuto, Thomas. "Vie privée, vie publique et cybercriminalité". Sécurité globale 6, nr 4 (2008): 45. http://dx.doi.org/10.3917/secug.006.0045.
Pełny tekst źródłaMehl, Dominique. "La « vie publique privée »". Hermès N° 13-14, nr 1 (1994): 95. http://dx.doi.org/10.4267/2042/15518.
Pełny tekst źródłaRozprawy doktorskie na temat "Respectueux de la vie privée"
Plateaux, Aude. "Solutions opérationnelles d'une transaction électronique sécurisée et respectueuse de la vie privée". Phd thesis, Université de Caen, 2013. http://tel.archives-ouvertes.fr/tel-01009349.
Pełny tekst źródłaPlateaux, Aude. "Solutions opérationnelles d’une transaction électronique sécurisée et respectueuse de la vie privée". Caen, 2013. https://tel.archives-ouvertes.fr/tel-01009349.
Pełny tekst źródłaBy using one's credit card to make a purchase on the Internet or one's mobile phone to connect to social networks, electronic transactions have become part of one's daily routine, in a seemingly inescapable fashion. Unfortunately, these exchanges involve the transfer of a large amount of personal data. Such computerization is not without consequence. The issues of security and privacy protection are truly present. In this thesis, we address the following issue: how to protect one's personal data in computer systems, focusing on three topical subjects. First, we propose a data management system centered on the user. Thus, when the user browses on the Internet, he/she will be guided and have the opportunity to refer to any of the eight features of the application. The second area deals with the managing of the patient's medical records and access control. We propose an e-health architecture in order to ensure the protection of the patient's personal data both within a health establishment and between separate institutions. Finally, we are interested in the field of electronic banking, and more specifically, online payment. We have suggested three new e-payment protocols ensuring the client's privacy. The first two protocols improve existing ones: 3D -Secure, Ashrafi and Ng. The last and completely new architecture allows to pay on the Internet without disclosing any of the user's banking information. With each of these architectures, come security and privacy requirements. The analysis of existing solutions and new propositions are carried out in accordance with these security requirements. Each architecture presented here ensures privacy and comes with a software proof of concept
Ates, Mikaël. "Identités numériques : gestion inter-organisationnelle centrée sur l'utilisateur et respectueuse de la vie privée". Phd thesis, Université Jean Monnet - Saint-Etienne, 2009. http://tel.archives-ouvertes.fr/tel-00443910.
Pełny tekst źródłaBenkhelif, Tarek. "Publication de données personnelles respectueuse de la vie privée : une démarche fondée sur le co-clustering". Thesis, Nantes, 2018. http://www.theses.fr/2018NANT4070/document.
Pełny tekst źródłaThere is a strong economic and civic demand for the opening of individual data. However, the publication of such data poses a risk to the individuals represented in it. This thesis focuses on the problem of anonymizing multidimensional data tables containing individual data for publishing purposes. In particular, two data anonymization approaches families will be focused on: the first aims to merge each individual into a group of individuals, the second is based on the addition of disruptive noise to the original data. Two new approaches are developed in the context of group anonymization. They aggregate the data using a co-clustering technique and then use the produced model, to generate synthetic records, in the case of the first solution. While the second proposal seeks to achieve the formalism of k-anonymity. Finally, we present a new anonymization algorithm “DPCocGen” that ensures differential privacy. First, a data-independent partitioning on the domains is used to generate a perturbed multidimensional histogram, a multidimensional co-clustering is then performed on the noisy histogram resulting in a partitioning scheme. Finally, the resulting schema is used to partition the original data in a differentially private way. Synthetic individuals can then be drawn from the partitions
Guittet, Leo. "La transparence des données de santé issues des bases médico-administratives : Pour une ouverture des bases de données respectueuse de la vie privée". Thesis, Lyon, 2019. http://www.theses.fr/2019LYSE3028.
Pełny tekst źródłaDigitized data is an integral part of our daily lives. Among them, personal health data represent a particularly sensitive group which must be processed and shared with care because they contain information relating to the private lives of individuals. They are therefore subject to special protection as a matter of principle. But at the same time, they are highly coveted because of their potential to improve the entire healthcare system. In France, two major historical databases, SNIIRAM and PMSI, are dedicated to the collection and processing of health data. Although these databases do not contain any personally identifying information, they have long been accessible only under very strict conditions, sometimes difficult to understand, in the name of respect for the privacy of individuals. However, difficult access to these databases represents a proven loss of knowledge, and legal and technical means exist to ensure data security and the right to privacy of individuals. It is for this reason in particular that the procedures for accessing the personal health data contained in these databases have been completely reformed and continue to be reformed. To fully understand the process that led to the recent opening of medico-administrative databases, this study focuses on how access to these data has worked from their creation to the present day. With regard to the types of access that exist, this requires positioning oneself from three angles: that of privileged public actors who benefit from permanent access; that of ordinary public actors and private non-profit actors who can access certain data by complying with a prior authorization regime; and that of private for-profit actors who were first excluded from access to health data before finally being admitted. The evolution of access to this sensitive data is still a headlining topic due to a further reform of the governance of medico-administrative databases and their content. This new project aims to ensure that the protection of the right to privacy is combined with the widest possible access to as much health data as possible
Scholler, Rémy. "Analyse de données de signalisation mobile pour l’étude de la mobilité respectueuse de la vie privée : Application au secteur du transport routier de marchandises". Electronic Thesis or Diss., Bourgogne Franche-Comté, 2024. http://www.theses.fr/2024UBFCD001.
Pełny tekst źródłaMobile network operators have a significant data source derived from communications of all connected objects (not just smartphones) with the network. These signaling data is a massive source of location data and are regularly used for the mobility analysis. However, potential uses face two major challenges: their low spatiotemporal precision and their highly sensitive nature concerning privacy.In the first phase, the thesis work enhances the understanding of the mobility state (stationary or in motion), speed, direction of movement of connected objects, and the route they take on a transportation infrastructure (e.g., road or rail).In the second phase, we demonstrate how to ensure the confidentiality of continuously produced mobility statistics. The use of signaling data, whether related to users or various connected objects, is legally regulated. For the study of mobility, operators tend to publish anonymized statistics (aggregated data). Specifically, the aim is to calculate complex and anonymized mobility statistics "on the fly" using differential privacy methods and probabilistic data structures (such as Bloom filters).Finally, in the third phase, we illustrate the potential of signaling data and the proposed approaches in this manuscript for quasi-real-time calculation of anonymous statistics on road freight transport. However, this is just an example of what could apply to other subjects analyzing population behaviors and activities with significant public and economic policy implications
Jacques, Thibaut. "Protocoles d’attestation dans les environnements dynamiques". Electronic Thesis or Diss., Limoges, 2024. http://www.theses.fr/2024LIMO0078.
Pełny tekst źródłaNetwork Functions Virtualisation (NFV) is a networking paradigm where network functions are implemented as software running inside virtualised instances (such as virtual machines or containers) rather than on dedicated hardware. This results in a cloud-like architecture where the virtual network functions (VNFs) are managed on a platform called the Network Function Virtualisation Infrastructure (NFVI). The use of NFVs adds more flexibility to the network. Operators can easily adapt their network by adding, removing, or moving VNFs between servers to scale up or down, or to deploy new services on demand. However, with this flexibility come security challenges. The European Telecommunications Standards Institute (ETSI) recommends the use of remote attestation as one of the tools to secure such an infrastructure. An attestation protocol is a two-party cryptographic protocol in which a prover provides evidence about one or more properties to a verifier. Deep attestation extends the concept of attestation to a virtualized environment, where both the virtual instance and the underlying infrastructure are attested. Although remote attestation, and to a lesser extent deep attestation, are not new techniques, current approaches are not suitable for the NFV environment. In this thesis, we propose three privacy-preserving attestation protocols for the NFV context. We formally prove the security of our proposals. In addition, we demonstrate the effectiveness of our protocols with implementations and experimental results. A first scheme establishes the concept of deep attestation and enhances the current state-of-the-art by providing a solution that strikes a balance between the security and performance of the two predominant existing methods. Based on this building block, we introduce two new schemes that respond to more complex use cases. These schemes take into account the privacy issues that arise in multi-tenant virtualised networks, while being efficient even on large infrastructures and maintaining the security guarantees of the basic building block
Bernes, Bénédicte. "La vie privée du mineur". Toulouse 1, 2006. http://www.theses.fr/2006TOU10035.
Pełny tekst źródłaThe last decades have seen minors getting even more self sufficient and more individualized within the society, but also within the family context. By the way, the Internatinal Convention on the rights of the Child has settled the basis of a right of the respect of the private life of minors. But, considering its vulnerability, minors cannot benefit from those dispositions. Indeed, subjected to the parental authority, children can benefit from a limited autonomy. Children private life seems to be compound to shrink away. Thus, the incapacity of children is justified by its need of protection related to their own interests. But, the International convention on children rights recommends a stronger power for children in terms of booth protection and autonomy. Since the interest of children is not limited to their protection, but it is extended to their personal blooming, children incapacity can be regarded to be inconsistent. Personally speaking, teenagers do not need parental authority. A sufficient protection could be granted to minors ; outside the parental responsability meanwhile children could use their individual freedom in compliance with their given rights. Thus, advocating the children individual rights seems accurate encompassing their parents. Hence, it would be appropriate to propose the adolescent minor's recognition a right to the respect of its personal life on condition that its own interest is keep safe. He could exercise this right thanks to a special capacity and oppose it even its parents
Ramsewak, Shamila. "La vie privée des fonctionnaires". Paris 13, 2011. http://scbd-sto.univ-paris13.fr/secure/ederasme_th_2011_ramsewak.pdf.
Pełny tekst źródłaDirrenberger, Géraldine. "Employeur, salarié et vie privée". Thesis, Montpellier 1, 2012. http://www.theses.fr/2012MON10032.
Pełny tekst źródłaThe border between private and professional life can be confusing. The notion of private life differs from the importance each individual allows it, it follows as well the evolution of the society. Inside the working relationship, distinguished among the subordination connection, which priority should we assign it ? If there is agreement that in the working place a remaining private sphere truly exists, how can we efficiently unite it with the productivity requirements of the working environment ? Despite a strong protection of the employee's private life, the professional sphere stepping into the private one is an additional risk to see this idea to lose its meaning. The goal of our study is to point out the changes that occurred at work especially with the use of new technologies and the difficulties experienced due to the requirements to respect the employee's personal freedom. In this context we are considering some solutions to have those two spheres working together despite the balance requirement that must oversee the working relationship
Książki na temat "Respectueux de la vie privée"
Steiner, Olivier. La vie privée: Roman. [Paris]: Gallimard, 2014.
Znajdź pełny tekst źródłafrançaise, France Documentation, red. Médias et vie privée. Paris: Documentation Française, 2007.
Znajdź pełny tekst źródłaChassigneux, Cynthia. Vie privée et commerce électronique. Montréal, QC: Éditions Themis, 2004.
Znajdź pełny tekst źródłaSylvie, Del Cotto, red. Ma vie privée sur Internet. [Paris]: Marabout, 2009.
Znajdź pełny tekst źródłaEleb, Monique. Architectures de la vie privée. Bruxelles: Aux Archives d'architecture moderne, 1989.
Znajdź pełny tekst źródłaPhilippe, Ariès, i Duby Georges, red. Histoire de la vie privée. Paris: Seuil, 1987.
Znajdź pełny tekst źródłaPiron, Olivier. L'urbanisme de la vie privée. La Tour d'Aigues: Aube, 2014.
Znajdź pełny tekst źródłaGraves, Frank. La vie privée exposée: Le sondage canadien sur le respect de la vie privée. Ottawa, Ont: Communications Canada, 1993.
Znajdź pełny tekst źródłaBurgade, Denis de La. La vie privée des hommes politiques. Villeneuve-d'Ascq: Presses universitaires du septentrion, 2002.
Znajdź pełny tekst źródłaAnnie, Rieu, red. Femmes: Engagements publics et vie privée. Paris: Syllepse, 2003.
Znajdź pełny tekst źródłaCzęści książek na temat "Respectueux de la vie privée"
Deneer, Eveline. "Painting the ‘vie privée of Our Forefathers’". W Representing the Past in the Art of the Long Nineteenth Century, 32–47. New York: Routledge, 2021. http://dx.doi.org/10.4324/9781351004183-2.
Pełny tekst źródłaZXIVANOVICH, Sava, Branislav TODOROVIC, Jean-Pierre LORRÉ, Darko TRIFUNOVIC, Adrian KOTELBA, Ramin SADRE i Axel LEGAY. "L’IdO pour une nouvelle ère de réseaux unifiés, de confiance zéro et de protection accrue de la vie privée". W Cybersécurité des maisons intelligentes, 185–213. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch5.
Pełny tekst źródłaBOUCAUD, Pascale. "Protection de la liberté et de la fragilité de la personne face au robot". W Intelligence(s) artificielle(s) et Vulnérabilité(s) : kaléidoscope, 137–48. Editions des archives contemporaines, 2020. http://dx.doi.org/10.17184/eac.3642.
Pełny tekst źródła"Équilibre vie professionnelle-vie privée". W Comment va la vie ?, 133–56. OECD, 2011. http://dx.doi.org/10.1787/9789264121195-8-fr.
Pełny tekst źródła"Vie professionnelle et privée". W Les grandes mutations qui transforment l'éducation. OECD, 2022. http://dx.doi.org/10.1787/2072904e-fr.
Pełny tekst źródłaFillod-Chabaud, Aurélie. "Justice et vie privée". W Au nom du père, 175–204. ENS Éditions, 2022. http://dx.doi.org/10.4000/books.enseditions.40397.
Pełny tekst źródła"Vie privée: Quelques aspects". W Histoire de la pharmacie en france et en nouvelle-france au XVIIIe siècle, 213–34. Les Presses de l’Université de Laval, 2009. http://dx.doi.org/10.1515/9782763706221-014.
Pełny tekst źródłaLeterrier, Sophie-Anne. "Vie privée, vie publique : le cas Béranger". W La Médiatisation de la vie privée xve-xxe siècle, 207–24. Artois Presses Université, 2012. http://dx.doi.org/10.4000/books.apu.1539.
Pełny tekst źródłaBiland, Émilie. "Dédicace". W Gouverner la vie privée, 5. ENS Éditions, 2019. http://dx.doi.org/10.4000/books.enseditions.13650.
Pełny tekst źródłaBiland, Émilie. "Note de l’autrice". W Gouverner la vie privée, 7. ENS Éditions, 2019. http://dx.doi.org/10.4000/books.enseditions.13656.
Pełny tekst źródłaStreszczenia konferencji na temat "Respectueux de la vie privée"
Bayard, Pierre. "Les personnages ont une vie privée". W Premier symposium de critique policière. Autour de Pierre Bayard. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4838.
Pełny tekst źródłaNoé, Paul-Gauthier, Andreas Nautsch, Driss Matrouf, Pierre-Michel Bousquet i Jean-François Bonastre. "Faire le pont entre l’observation et la preuve : Application au respect de la vie privée". W XXXIVe Journées d'Études sur la Parole -- JEP 2022. ISCA: ISCA, 2022. http://dx.doi.org/10.21437/jep.2022-56.
Pełny tekst źródłaRaporty organizacyjne na temat "Respectueux de la vie privée"
Vilain, Vincent. Protéger la vie privée via un réseau adversarial d’attaque de réidentification. Observatoire international sur les impacts sociétaux de l'intelligence artificielle et du numérique, wrzesień 2024. http://dx.doi.org/10.61737/tabe1427.
Pełny tekst źródłaCastets-Renard, Céline, Pierre-Luc Déziel i Lyse Langlois. Observations sur le document d'orientation sur la protection de la vie privée à l'intention des services de police relativement à la reconnaissance faciale. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, czerwiec 2021. http://dx.doi.org/10.61737/axib9435.
Pełny tekst źródłaBourassa Forcier, Mélanie, Dary-Anne Tourangeau, Gaëlle Feruzi i Mathieu Kiriakos. Introduction d’un télérobot en résidences privées : Enjeux légaux et organisationnels. CIRANO, kwiecień 2022. http://dx.doi.org/10.54932/obpe9357.
Pełny tekst źródłaDenier, Nicole, Rebecca Deutsch, Yang Hu i Yue Qian. Réfléchir aux effets de la transformation numérique sur les familles au Canada. L’Institut Vanier de la famille, wrzesień 2024. http://dx.doi.org/10.61959/wvfh3683f.
Pełny tekst źródłaGautrais, Vincent, i Nicolas Aubin. Modèle d'évaluation des facteurs relatifs à la circulation des données: Instrument de protection de la vie privée et des droits et libertés dans le développement et l’usage de l’intelligence artificielle. Observatoire international sur les impacts sociétaux de l'IA et du numérique, marzec 2022. http://dx.doi.org/10.61737/rrlb1735.
Pełny tekst źródłaCastets-Renard, Céline, Émilie Guiraud i Jacinthe Avril-Gagnon. Cadre juridique applicable à l’utilisation de la reconnaissance faciale par les forces de police dans l’espace public au Québec et au Canada Éléments de comparaison avec les États-Unis et l’Europe : sommaire exécutif et recommandations. Observatoire international sur les impacts sociétaux de l'IA et du numérique, wrzesień 2020. http://dx.doi.org/10.61737/ebuf7752.
Pełny tekst źródłaCastets-Renard, Céline, Émilie Guiraud i Jacinthe Avril-Gagnon. Cadre juridique applicable à l’utilisation de la reconnaissance faciale par les forces de police dans l’espace public au Québec et au Canada Éléments de comparaison avec les États-Unis et l’Europe. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, wrzesień 2020. http://dx.doi.org/10.61737/tnps5755.
Pełny tekst źródła