Gotowa bibliografia na temat „Sécurité Internet”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Sécurité Internet”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Sécurité Internet"
Falque-Pierrotin, Isabelle. "Internet, sécurité et libertés". Annales des Mines - Réalités industrielles Mai 2009, nr 2 (2009): 77. http://dx.doi.org/10.3917/rindu.092.0077.
Pełny tekst źródłaNorodom, Anne-Thida. "La galaxie Internet". Questions internationales 91-92, nr 3 (27.06.2018): 59–70. http://dx.doi.org/10.3917/quin.091.0059.
Pełny tekst źródła-CHICHE, Thierry. "La sécurité internet appliquée aux systèmes de production". Revue de l'Electricité et de l'Electronique -, nr 06 (2001): 75. http://dx.doi.org/10.3845/ree.2001.069.
Pełny tekst źródłaMeiller, Yannick. "La sécurité de l’information devrait être plus présente dans les programmes des écoles de management". Sécurité et stratégie 32, nr 4 (19.03.2024): 12–16. http://dx.doi.org/10.3917/sestr.032.0012.
Pełny tekst źródłaTschumi Canosa, Xavier, i Thania Paffenholz. "Coopération internationale entre paix et sécurité : portes d’entrée sur Internet". Annuaire suisse de politique de développement, nr 25-2 (1.10.2006): 229–31. http://dx.doi.org/10.4000/aspd.282.
Pełny tekst źródłaTschudi, Hunziker, Kündig, Lüscher, Freiermuth, Heller i Heberer. "Internet-Kommunikation zwischen Hausärzten und Universitätsspital". Praxis 91, nr 7 (1.02.2002): 257–60. http://dx.doi.org/10.1024/0369-8394.91.7.257.
Pełny tekst źródłaBernie Baeaufort. "Vote en ligne pour les initiatives de terrain en Californie : Collecte de signatures électroniques". International Journal of Science and Society 4, nr 4 (18.10.2022): 75–83. http://dx.doi.org/10.54783/ijsoc.v4i4.555.
Pełny tekst źródłaOuimet, Marc. "Réflexions sur Internet et les tendances de la criminalité". Criminologie 39, nr 1 (26.06.2006): 7–21. http://dx.doi.org/10.7202/013123ar.
Pełny tekst źródłaBryce, George K., i Pran Manga. "The Effectiveness of Health and Safety Committees". Articles 40, nr 2 (12.04.2005): 257–83. http://dx.doi.org/10.7202/050133ar.
Pełny tekst źródłaVallet, Caroline. "La cyberpédopornographie : au centre des débats". Chronique de législation 40, nr 2 (17.10.2014): 599–615. http://dx.doi.org/10.7202/1026961ar.
Pełny tekst źródłaRozprawy doktorskie na temat "Sécurité Internet"
Jacquin, Ludovic. "Compromis performance/sécurité des passerelles très haut débit pour Internet". Phd thesis, Université de Grenoble, 2013. http://tel.archives-ouvertes.fr/tel-00911075.
Pełny tekst źródłaAissaoui, Mehrez Hassane. "Sécurité pour les réseaux du futur : gestion sécurisée des identités". Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066606.
Pełny tekst źródłaToday, the Internet is changing radically our habits, especially with the massive influx of the nomadic techniques, the Internet of objects, the growing use of grid computing, wireless networks and the emergence of new approaches in recent years. In particular, the virtualization of the computing infrastructures, which allowed defining a new model called Cloud Computing, introducing an enough frank breakdown with the traditional models, can be perceived as a preparatory stage towards the Internet of future.The implementation of these approaches allows, in a different way : mutualization and organization of the computer system. It allows to dematerialize the physical infrastructures and to deport applications on distant containers. Therefore, the global architecture of Internet should be evolved. It will rely strongly on these new approaches and in particular, Cloud Computing and virtualization. However, no system is infallible especially if resources are distributed and mutualized. They raise a number of problems and involve directly security issues, which remain one of the main barriers to the adoption of these technologies.Like any new technology, Cloud Computing and virtualization create new risks, which come to graft to traditional threats of the outsourcing management of the privilege separation, the identity and accesses management, the robustness of the virtualization software, the virtual machine isolation, the personal data protection, reversibility, privacy... The traditional Internet architecture cannot provide the adequate solutions to the challenges raised by these new approaches: mobility, flexibility, security requirements, reliability and robustness. Thus, a research project (SecFuNet : Security For Future Networks) was validated by the European Commission, to provide some answers, to make a state of the art of these security mechanisms and a comprehensive study of orchestration and integration techniques based on protection components within overall security architecture
Aissaoui, Mehrez Hassane. "Sécurité pour les réseaux du futur : gestion sécurisée des identités". Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066606.
Pełny tekst źródłaToday, the Internet is changing radically our habits, especially with the massive influx of the nomadic techniques, the Internet of objects, the growing use of grid computing, wireless networks and the emergence of new approaches in recent years. In particular, the virtualization of the computing infrastructures, which allowed defining a new model called Cloud Computing, introducing an enough frank breakdown with the traditional models, can be perceived as a preparatory stage towards the Internet of future.The implementation of these approaches allows, in a different way : mutualization and organization of the computer system. It allows to dematerialize the physical infrastructures and to deport applications on distant containers. Therefore, the global architecture of Internet should be evolved. It will rely strongly on these new approaches and in particular, Cloud Computing and virtualization. However, no system is infallible especially if resources are distributed and mutualized. They raise a number of problems and involve directly security issues, which remain one of the main barriers to the adoption of these technologies.Like any new technology, Cloud Computing and virtualization create new risks, which come to graft to traditional threats of the outsourcing management of the privilege separation, the identity and accesses management, the robustness of the virtualization software, the virtual machine isolation, the personal data protection, reversibility, privacy... The traditional Internet architecture cannot provide the adequate solutions to the challenges raised by these new approaches: mobility, flexibility, security requirements, reliability and robustness. Thus, a research project (SecFuNet : Security For Future Networks) was validated by the European Commission, to provide some answers, to make a state of the art of these security mechanisms and a comprehensive study of orchestration and integration techniques based on protection components within overall security architecture
Mouelhi, Tejeddine. "Modélisation et test de mécanismes de sécurité dans des applications internet". Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-00544431.
Pełny tekst źródłaClaeys, Timothy. "Sécurité pour l'internet des objets : une approche des bas en haut pour un internet des objets sécurisé et normalisé". Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAM062.
Pełny tekst źródłaThe rapid expansion of the IoT has unleashed a tidal wave of cheap Internet-connected hardware. Formany of these products, security was merely an afterthought. Due to their advanced sensing and actuatingfunctionalities, poorly-secured IoT devices endanger the privacy and safety of their users.While the IoT contains hardware with varying capabilities, in this work, we primarily focus on the constrainedIoT. The restrictions on energy, computational power, and memory limit not only the processingcapabilities of the devices but also their capacity to protect their data and users from attacks. To secure theIoT, we need several building blocks. We structure them in a bottom-up fashion where each block providessecurity services to the next one.The first cornerstone of the secure IoT relies on hardware-enforced mechanisms. Various security features,such as secure boot, remote attestation, and over-the-air updates, rely heavily on its support. Sincehardware security is often expensive and cannot be applied to legacy systems, we alternatively discusssoftware-only attestation. It provides a trust anchor to remote systems that lack hardware support. In thesetting of remote attestation, device identification is paramount. Hence, we dedicated a part of this work tothe study of physical device identifiers and their reliability.The IoT hardware also frequently provides support for the second building block: cryptography. Itis used abundantly by all the other security mechanisms, and recently much research has focussed onlightweight cryptographic algorithms. We studied the performance of the recent lightweight cryptographicalgorithms on constrained hardware.A third core element for the security of the IoT is the capacity of its networking stack to protect the communications.We demonstrate that several optimization techniques expose vulnerabilities. For example,we show how to set up a covert channel by exploiting the tolerance of the Bluetooth LE protocol towardsthe naturally occurring clock drift. It is also possible to mount a denial-of-service attack that leverages theexpensive network join phase. As a defense, we designed an algorithm that almost completely alleviates theoverhead of network joining.The last building block we consider is security architectures for the IoT. They guide the secure integrationof the IoT with the traditional Internet. We studied the IETF proposal concerning the constrainedauthentication and authorization framework, and we propose two adaptations that aim to improve its security.Finally, the deployment of the IETF architecture heavily depends on the security of the underlying communicationprotocols. In the future, the IoT will mainly use the object security paradigm to secure datain flight. However, until these protocols are widely supported, many IoT products will rely on traditionalsecurity protocols, i.e., TLS and DTLS. For this reason, we conducted a performance study of the most criticalpart of the protocols: the handshake phase. We conclude that while the DTLS handshake uses fewerpackets to establish the shared secret, TLS outperforms DTLS in lossy networks
Saleh, Hayder. "Une architecture novatrice de sécurité à base de carte à puce Internet". Versailles-St Quentin en Yvelines, 2002. http://www.theses.fr/2002VERSA009.
Pełny tekst źródłaBachy, Yann. "Sécurité des équipements grand public connectés à Internet : évaluation des liens de communication". Thesis, Toulouse, INSA, 2015. http://www.theses.fr/2015ISAT0014/document.
Pełny tekst źródłaToday, equipment embedding software and an Internet connection are more and more numerous and various. With the emergence of “the internet of things” and the trend to interconnect everything, many equipment used in our every day life are now connected to the internet: Smart-Tvs, DVD players, alarm and home automation systems, and even health assistance home devices, for example. Unfortunately, these technological evolutions also introduce new security threats. The massive use of internet facilitates the propagation of malware, capable of targeting any computer device, and more specifically any internet connected device. Although several methods allowing security analysis of industrial systems exist, their application to home devices is still limited. The existence and the criticality of potential vulnerabilities in these devices are not well-known, because they have not been thoroughly studied. This is precisely the objective of this thesis, which presents a method allowing to carry out a vulnerability analysis of internet connected home devices. This method is composed of two main phases: a risk analysis phasefollowed by an experimental phase. The security analysis of any type of equipement, requires a good knowledge ofits environment. In order to guide the evaluator in this task, we propose, as a first step, to rely on existing risk analysis methods. These methods are now mature, and allow the evaluator to obtain a global view of the risks incurred by the usage of anequipment. Then, during the second step of our method, the evaluator concentrates on the most important risks in order to demonstrate the technical feasibility of the scenarios leading to the considered risks, by carrying out several experiments.Considering the large amount and the diversity of I/Os on connected devices, it is important to focus on specifically rich attack scenarios, possibly depending on a simple local vulnerability. For this second step, an experimental method is proposedin order to study these attack scenarios, which, moreover, target equipement whose specifications are not necessarily available.In order to illustrate the entire method, this thesis presents two case studies: Integrated Access Devices and Smart-Tvs. These studies are carried out on a panel of devices from major internet service providers and TV manufacturers, allowing us to compare several devices available on the market. The vulnerabilities pointed out, mainly concern the communication means (local loop for the IAD, DVB-T interface for the smart-TVs) connecting these devices to their service providers (ISP for the IAD, TV and VoD for the smart-TVs). These communication links are usually considered safe, and have been, to our knowledge, seldom explored. Thisthesis thereby contributes to the security analysis of these particular communication means for connected devices and points out some original attack paths. Finally, this thesis ends by presenting different existing security mechanisms that can be used to avoid exploitation of the identified weaknesses
Vu, Van-Hoan. "Infrastructure de gestion de la confiance sur internet". Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2010. http://tel.archives-ouvertes.fr/tel-00611839.
Pełny tekst źródłaGuillet, Thomas. "Sécurité de la téléphonie sur IP". Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00559130.
Pełny tekst źródłaGuillet, Thomas. "Sécurité de la téléphonie sur IP". Phd thesis, Paris, Télécom ParisTech, 2010. https://pastel.hal.science/pastel-00559130.
Pełny tekst źródłaThis work focuses on the security of telephony networks deployed in the Internet. Without any doubt after the Web and messaging application, this service will impose IP (Internet Protocol) infrastructures like the standard for all types of information or media. Initially, we look for opportunities to strengthen the security of SIP (Session Initiation Protocol) IETF protocol currently massively adopted in the telephony infrastructure. We propose and validate innovative solutions to strengthen existing mechanisms in a completely transparent way for infrastructures. We choose to focus on authentication, because it is the first mechanism encountered by users or systems. The solutions presented below propose new security properties by defining a semantic field called "opaque". In a second step, we are interested in security solutions for end-to-end calls. Analysis of application solutions as “Future Narrow Band Digital Terminal” and “Simple Secure Voice over IP protocol“ allows us to formalize the specification of an architecture to protect conversations whatever the specificities and heterogeneity of networks ToIP are. Finally, the conclusion takes over and takes positions on the various contributions to this work in the context of IP telephony. Our will to be interoperable with the underlying or independent infrastructure can be considered as a value added service
Książki na temat "Sécurité Internet"
Ghernaouti-Hélie, Solange. Internet et sécurité. Paris: Presses universitaires de France, 2002.
Znajdź pełny tekst źródłaPiette-Coudol, Thierry. Les objets connectés: Sécurité juridique et technique. Paris: Lexis Nexis, 2015.
Znajdź pełny tekst źródłaSimon, Cooper, i Chapman D. Brent, red. Building Internet Firewalls: Internet and Web security. Wyd. 2. Beijing: O'Reilly, 2000.
Znajdź pełny tekst źródłaBloch, Laurent. Sécurité informatique: Principes et méthode. Paris: Eyrolles, 2007.
Znajdź pełny tekst źródłaChapman, D. Brent. Building Internet firewalls. Cambridge, MA: O'Reilly & Associates, 1995.
Znajdź pełny tekst źródłaD, Zwicky Elizabeth, red. Building Internet Firewalls. Sebastopol, CA: O'Reilly & Associates, 1995.
Znajdź pełny tekst źródłaOppliger, Rolf. Internet and Intranet security. Boston: Artech House, 1998.
Znajdź pełny tekst źródłaInternet and Intranet security. Wyd. 2. Boston, MA: Artech House, 2002.
Znajdź pełny tekst źródła1974-, Lacour Stéphanie, Asphalès (Research program) i Centre national de la recherche scientifique (France), red. La sécurité aujourd'hui dans la société de l'information. Paris: Harmattan, 2007.
Znajdź pełny tekst źródła1974-, Lacour Stéphanie, Asphalès (Research program) i Centre national de la recherche scientifique (France), red. La sécurité aujourd'hui dans la société de l'information. Paris: Harmattan, 2007.
Znajdź pełny tekst źródłaCzęści książek na temat "Sécurité Internet"
KHALIL, Ahmad, Nader MBAREK i Olivier TOGNI. "Adaptation du contrôle d’accès pour la sécurité de l’IoT". W La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 169–204. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch7.
Pełny tekst źródłaAL AGHA, Khaldoun, Pauline LOYGUE i Guy PUJOLLE. "Internet des Edges : la virtualisation". W Edge Networking, 157–78. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9068.ch8.
Pełny tekst źródłaAL AGHA, Khaldoun, Pauline LOYGUE i Guy PUJOLLE. "Le déploiement de l’Internet participatif". W Edge Networking, 221–39. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9068.ch11.
Pełny tekst źródłaWalczack, Cathy, i Serge Keroullé. "9 Le MASE : Manuel Amélioration Sécurité Entreprises". W La sous-traitance interne, 241–56. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7-011.
Pełny tekst źródłaWalczack, Cathy, i Serge Keroullé. "9 Le MASE : Manuel Amélioration Sécurité Entreprises". W La sous-traitance interne, 241–56. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7.c011.
Pełny tekst źródłaMoinet, Nicolas, i Guilhem Armanet. "Outil 28. La communication interne". W La boîte à outils de la sécurité économique, 92–93. Dunod, 2015. http://dx.doi.org/10.3917/dunod.moine.2015.01.0092.
Pełny tekst źródłaAgut, Gérard, i Alain Colman. "14 La politique hygiène et sécurité d’une PME de mécanique industrielle". W La sous-traitance interne, 296–303. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7-016.
Pełny tekst źródłaAgut, Gérard, i Alain Colman. "14 La politique hygiène et sécurité d’une PME de mécanique industrielle". W La sous-traitance interne, 296–303. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7.c016.
Pełny tekst źródłaDuchêne, François. "12 Formations externes à la sécurité pour les établissements classés Seveso, un dispositif sous pression1". W La sous-traitance interne, 272–86. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7-014.
Pełny tekst źródłaDuchêne, François. "12 Formations externes à la sécurité pour les établissements classés Seveso, un dispositif sous pression1". W La sous-traitance interne, 272–86. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-0842-7.c014.
Pełny tekst źródłaStreszczenia konferencji na temat "Sécurité Internet"
Rodríguez González, Sylvia Cristina. "Megadesarrollos turísticos de sol y playa enclaves del imaginario". W International Conference Virtual City and Territory. Barcelona: Centre de Política de Sòl i Valoracions, 2009. http://dx.doi.org/10.5821/ctv.7522.
Pełny tekst źródłaRaporty organizacyjne na temat "Sécurité Internet"
Marsden, Eric. Partage des modèles de sécurité entre donneurs d’ordres et entreprises intervenantes. Fondation pour une culture de sécurité industrielle, grudzień 2018. http://dx.doi.org/10.57071/360upb.
Pełny tekst źródłaGautrais, Vincent, i Nicolas Aubin. Modèle d'évaluation des facteurs relatifs à la circulation des données: Instrument de protection de la vie privée et des droits et libertés dans le développement et l’usage de l’intelligence artificielle. Observatoire international sur les impacts sociétaux de l'IA et du numérique, marzec 2022. http://dx.doi.org/10.61737/rrlb1735.
Pełny tekst źródłaFlandin, Simon, Germain Poizat i Romuald Perinet. Proactivité et réactivité: deux orientations pour concevoir des dispositifs visant le développement de la sécurité industrielle par la formation. Fondation pour une culture de sécurité industrielle, luty 2021. http://dx.doi.org/10.57071/948rpn.
Pełny tekst źródłaMbaye, Safiétou, Rémi Kouabenan i Philippe Sarnin. L'explication naïve et la perception des risques comme des voies pour améliorer les pratiques de REX: des études dans l'industrie chimique et l'industrie nucléaire. Fondation pour une culture de sécurité industrielle, wrzesień 2009. http://dx.doi.org/10.57071/311rex.
Pełny tekst źródłaFICHE D’INFORMATION : D’auto-défenseurs à justiciers : un cadre typologique pour les groupes armés communautaires. RESOLVE Network, grudzień 2020. http://dx.doi.org/10.37805/fs2020.6.cbags.fr.
Pełny tekst źródła