Gotowa bibliografia na temat „Techniques de protection de la vie privée”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Techniques de protection de la vie privée”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Techniques de protection de la vie privée"
Firdion, Jean-Marie, i Benoît Riandey. "Vie personnelle et enquête par téléphone : l'exemple de l'enquête ACSF". Population Vol. 48, nr 5 (1.05.1993): 1257–80. http://dx.doi.org/10.3917/popu.p1993.48n5.1280.
Pełny tekst źródłade Solminihac, Arnaud, i Xavier de Bonnaventure. "Correspondances et vie privée. Approche comparée des protections de la confidentialité en droits français, américain et anglais". Tribonien N° 7, nr 2 (11.03.2024): 154–74. http://dx.doi.org/10.3917/trib.007.0154.
Pełny tekst źródłaKnoppers, Bartha Maria. "Vérité et information de la personne". Congrès de l’Association Henri Capitant : la vérité et le droit 18, nr 4 (8.04.2019): 819–42. http://dx.doi.org/10.7202/1058580ar.
Pełny tekst źródłaPousson-Petit, Jacqueline. "La protection personnelle des malades mentaux dans les principaux droits européens". European Review of Private Law 3, Issue 3 (1.09.1995): 383–425. http://dx.doi.org/10.54648/erpl1995030.
Pełny tekst źródłaCadoux, Louise, i Pierre Tabatoni. "Internet et protection de la vie privée". Commentaire Numéro 89, nr 1 (2000): 57. http://dx.doi.org/10.3917/comm.089.0057.
Pełny tekst źródła-DESWARTE, Yves. "Protection de la vie privée sur Internet". Revue de l'Electricité et de l'Electronique -, nr 08 (2006): 65. http://dx.doi.org/10.3845/ree.2006.081.
Pełny tekst źródłaCassart, Alexandre, i Anne-Valentine Rensonnet. "Drones et vie privée : comment les concilier ?" Pin Code N° 10, nr 1 (28.02.2022): 1–7. http://dx.doi.org/10.3917/pinc.010.0001.
Pełny tekst źródłaBorgeat, Louis, i Anne-Marie Beaulieu. "Salaire des fonctionnaires et vie privée". Les Cahiers de droit 35, nr 4 (12.04.2005): 675–708. http://dx.doi.org/10.7202/043302ar.
Pełny tekst źródłaBarendt, Éric. "La protection de la vie privée en Angleterre". LEGICOM 20, nr 4 (1999): 115. http://dx.doi.org/10.3917/legi.020.0115.
Pełny tekst źródłaDebeuckelaere, Willem. "L’ADN et la protection de la vie privée". Médecine & Droit 2011, nr 106 (styczeń 2011): 67–69. http://dx.doi.org/10.1016/j.meddro.2010.10.026.
Pełny tekst źródłaRozprawy doktorskie na temat "Techniques de protection de la vie privée"
Balu, Raghavendran. "Privacy-aware and scalable recommender systems uing sketching techniques". Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S047/document.
Pełny tekst źródłaIn this thesis, we aim to study and evaluate the privacy and scalability properties of recommender systems using sketching techniques and propose scalable privacy preserving personalization mechanisms. Hence, the thesis is at the intersection of three different topics: recommender systems, differential privacy and sketching techniques. On the privacy aspects, we are interested in both new privacy preserving mechanisms and the evaluation of such mechanisms. We observe that the primary parameter in differential privacy is a control parameter and motivated to find techniques that can assess the privacy guarantees. We are also interested in proposing new mechanisms that are privacy preserving and get along well with the evaluation metrics. On the scalability aspects, we aim to solve the challenges arising in user modeling and item retrieval. User modeling with evolving data poses difficulties, to be addressed, in storage and adapting to new data. Also, addressing the retrieval aspects finds applications in various domains other than recommender systems. We evaluate the impact of our contributions through extensive experiments conducted on benchmark real datasets and through the results, we surmise that our contributions very well address the privacy and scalability challenges
Leukam, Lako Franklin. "Protection des données à caractère personnel pour les services énergétiques". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS004.
Pełny tekst źródłaSmart grids are important bricks in the fight against climate change. Smart grids allow the massive introduction of renewable energies, which are intermittent, while guaranteeing grid stability, i.e., ensuring a real-time balance between demand and production in the power grid. The management of grid stability is possible thanks to smart meters installed in households, allowing the distribution system operator to collect consumption/production data from consumers/producers at a time step of up to 10 min in France. This real-time consumption data enables to provide new energy services, such as customer consumption forecasts or demand response. Demand response services help to avoid consumption peaks in a neighborhood by ensuring that, at all times, users' consumption does not exceed the maximum power of the local grid. However, the collection of users' consumptions is a key privacy concern. Indeed, individual consumption data reflect the use of all electric appliances by inhabitants in a household over time, and enable to deduce the behaviors, activities, age or preferences of the inhabitants. This thesis aims to propose new energy services, while protecting the privacy of consumers. We propose five contributions that relate to two themes:1- The transformation of a demand response algorithm by making it privacy friendly. This transformation uses secure multiparty computation, allowing to compute an aggregate, such as a sum of users’ consumption, without disclosing any individual consumption.2- The publication of sum of users' consumption while preserving privacy and good utility. This publication uses differential privacy, ensuring that the publication of the sum does not indirectly reveal individual users' consumption. Among other energy services, these sums of consumption enable to perform consumption forecasts
Duguépéroux, Joris. "Protection des travailleurs dans les plateformes de crowdsourcing : une perspective technique". Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S023.
Pełny tekst źródłaThis work focuses on protecting workers in a crowdsourcing context. Indeed, workers are especially vulnerable in online work, and both surveillance from platforms and lack of regulation are frequently denounced for endangering them. Our first contribution focuses on protecting their privacy, while allowing usages of their anonymized data for, e.g. assignment to tasks or providing help for task-design to requesters. Our second contribution considers a multi-platform context, and proposes a set of tools for law-makers to regulate platforms, allowing them to enforce limits on interactions in various ways (to limit the work time for instance), while also guaranteeing transparency and privacy. Both of these approaches make use of many technical tools such as cryptography, distribution, or anonymization tools, and include security proofs and experimental validations. A last, smaller contribution, draws attention on a limit and possible security issue for one of these technical tools, the PIR, when it is used multiple times, which has been ignored in current state-of-the-art contributions
Lolies, Isabelle. "La protection pénale de la vie privée". Aix-Marseille 3, 1998. http://www.theses.fr/1998AIX32060.
Pełny tekst źródłaNitard, Evelyne. "La Vie privée des personnes célèbres". Paris 10, 1987. http://www.theses.fr/1987PA100146.
Pełny tekst źródłaTo deal with the private life of famous people is to get in difficulty immediately because such a subject introduces antinomic notions that must be tried to be conciliated daily. Different persons - the famous people, the media and the public - are implicated as asserting opposed moral and financial points of view and interests. To assure the protection of famous persons' private life, we must examine quality and quantity of regularly committed slurs, then we must try to form a true notion of private life and finally we must investigate which sanctions are considered and which are possible
Morgenroth, Thomas. "La vie privée en droit du travail". Thesis, Lille 2, 2016. http://www.theses.fr/2016LIL20016/document.
Pełny tekst źródłaBecause of its relativity, the concept of privacy is a difficult notion to define. French legislation defines it in different ways both between public institutions and citizens as well as among individuals. Moreover, the right to privacy presents an ambivalence as it gives an individual both a freedom of choice and a right of control. Therefore, privacy challenges employment laws which cannot deal satisfactorily with it as work relation has the specificity to create a link of subordination between private individuals. Yet, many of these dispositions contribute to protecting privacy. Though, in its civil law conception, there is some difficulty in resorting to privacy when it focuses on the secret of privacy.Paradoxically, the cases related to this subjective law and employees' privacy secret protection are far and few between. This freedom of privacy tends to ensure employees' protection in their privacy. Nevertheless, this freedom also applies in professional life and consequently appears as an essential instrument of the employee's protection in the workplace. Thus, the right for the employee's privacy to be respected inevitably tends to broaden its scope to the protection of freedom of privacy
Ajam, Nabil. "Privacy protection for location-based services". Télécom Bretagne, 2010. http://www.theses.fr/2010TELB0124.
Pełny tekst źródłaIn this dissertation, we propose the expression and the modelling of the most important principles of privacy. We deduce the relevant privacy requirements that should be integrated in existing security policy models, such as RBAC models. We suggest the application of a unique model for both access control and privacy requirements. Thus, an access control model is to be enriched with new access constraints and parameters, namely the privacy contexts, which should implement the consent and the notification concepts. For this purpose, we introduce the privacy-aware Organisation role Based Access Control (OrBAC) model. The administration of this new model is significantly different from previous models. Three cases are identified. First, the privacy policy may be defined by the data collector but data owners have the possibility to set their preferences through a contracted Service Level Agreement (SLA). Second, the administration model allows legal organisations, for legal purposes, to impose their needs by bypassing user's preferences. Third, we present the case of a privacy policy which is negotiated between the data collector and the requestor based on user's preferences, defined in the SLA. Overall, our proposal is a distributed administration of privacy policies. Focusing on Location Based Services (LBSs), we finally propose a complete privacy framework ready to be deployed in information systems. We use the model prototype to adapt our solution to cellular networks when the requesters are the service providers. This prototype uses parlay gateways with web services. We also extend the set of Parlay X gateway standardised web services by proposing a dedicated privacy web service to enforce privacy protection
Favre, Didier. "De l'homogénéité européenne dans l'insuffisante protection de la vie privée". Montpellier 1, 1992. http://www.theses.fr/1992MON10012.
Pełny tekst źródłaKaim, Guillaume. "Cryptographie post-quantique pour la protection de la vie privée". Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S077.
Pełny tekst źródłaThe past few years have seen the rising of the quantum computers, that are a serious threat to nearly all the actual cryptographic schemes used in practice. In this thesis we propose some new constructions to prevent this obsolescence by building our schemes on the mathematical tool of lattices that is assumed post-quantum resistant. We firstly develop a group signature scheme, allowing each member composing the group to anonymously sign on the behalf of the group. We add a supplementary property, which is the froward secrecy. This property cut the time in periods, such that each secret key is updated when entering a new period. We also propose a blind signature scheme, which is an interactive protocol between an user, who wants to sign a message, with a signer who possesses the signing secret key. We improve the state-of-the art by proposing a constructions without any restart and with a more efficient security. Finally as a use case of the blind signature, we develop an evoting protocol that take as a basis the construction described above
Roca, Gregory. "La vie privée et familiale du majeur protégé". Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM1034.
Pełny tekst źródłaNeglected by the various European legislators for a long time, incapacity Law has been a primary focus since the late nineties. Influenced by the European Council, France has undertaken a more humanistic reform. The new legislation should help to protect the most vulnerable ones while ensuring the exercise of their fundamental rights, including the right for respect of privacy. This dual objective seems both unrealistic and contradictory at the same time since all protection measures lead to capacity restrictions and therefore impact the most intimate decisions the protected adult has to make.Yet, wherever the protected adult live, in the city or in an institution, the llaw seems to have found balance. This is the result of a particular importance given to the natural ability, the will but also the autonomy of the individual.However, the system is not perfect. Sometimes, the legislator did not dare to go further and maintains disabilities by principle in areas the most related to the protected person’s privacy. At other times however, it goes too far choosing autonomy over protection. Improvements are needed. To this end, it is possible to consider the removal of the remaining disabilities and replace them with a protection scheme adjusting to the degree of disability of the individual. It is also possible to imagine a generalization of the assistance which is appropriate when decisions are closely related to the person
Książki na temat "Techniques de protection de la vie privée"
Chassigneux, Cynthia. Vie privée et commerce électronique. Montréal, QC: Éditions Themis, 2004.
Znajdź pełny tekst źródłaAlter, Susan. La protection de la vie privée et les télécommunications. Ottawa, Ont: Bibliothèque du Parlement, Service de recherche, 1996.
Znajdź pełny tekst źródłaManach, Jean-Marc. La vie privée, un problème de vieux cons? Paris: Fyp, 2010.
Znajdź pełny tekst źródłaVenne, Michel. Vie privée & démocratie à l'ère de l'informatique. Québec: Institut québécois de recherche sur la culture, 1994.
Znajdź pełny tekst źródłaVenne, Michel. Vie privée & démocratie à l'ère de l'informatique. Québec, Qué: Institut québécois de recherche sur la culture, 1994.
Znajdź pełny tekst źródłaBenyekhlef, Karim. La protection de la vie privée dans les échanges internationaux d'informations. Montréal, Qué: Éditions Thémis, 1992.
Znajdź pełny tekst źródłaQuébec (Province). Assemblée nationale. Commission permanente de la culture. Les cartes d'identité et la protection de la vie privée: Rapport final. Québec]: Secrétariat Des Commissions, 1998.
Znajdź pełny tekst źródłaOffice statistique des Communautés européennes., red. Protection de la vie privée, informatique et progrès de la documentation statistique. Luxembourg: Office des publications officielles des Communautés européennes, 1986.
Znajdź pełny tekst źródłaGauthier, Julie M. Le droit de la biométrie au Québec: Sécurité et vie privée. Cowansville, Québec: Éditions Yvon Blais, 2015.
Znajdź pełny tekst źródłaNadeau, Alain-Robert. Vie privée et droits fondamentaux: Étude de la protection de la vie privée en droit constitutionnel canadien et américain et en droit international. Scarborough, Ont: Carswell, 2000.
Znajdź pełny tekst źródłaCzęści książek na temat "Techniques de protection de la vie privée"
Dutkiewicz, Lidia, Yuliya Miadzvetskaya, Hosea Ofe, Alan Barnett, Lukas Helminger, Stefanie Lindstaedt i Andreas Trügler. "Privacy-Preserving Techniques for Trustworthy Data Sharing: Opportunities and Challenges for Future Research". W Data Spaces, 319–35. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98636-0_15.
Pełny tekst źródłaBOUCAUD, Pascale. "Protection de la liberté et de la fragilité de la personne face au robot". W Intelligence(s) artificielle(s) et Vulnérabilité(s) : kaléidoscope, 137–48. Editions des archives contemporaines, 2020. http://dx.doi.org/10.17184/eac.3642.
Pełny tekst źródłaVitalis, André. "La vie privée entre protection et exhibition". W La vie privée à l’heure des médias, 185–97. Presses Universitaires de Bordeaux, 2002. http://dx.doi.org/10.4000/books.pub.31891.
Pełny tekst źródłaMasson, André. "Protection sociale et privée contre l’inflation inédite des vieux jours". W Allongement de la vie, 215–34. La Découverte, 2017. http://dx.doi.org/10.3917/dec.masco.2017.01.0215.
Pełny tekst źródłaZXIVANOVICH, Sava, Branislav TODOROVIC, Jean-Pierre LORRÉ, Darko TRIFUNOVIC, Adrian KOTELBA, Ramin SADRE i Axel LEGAY. "L’IdO pour une nouvelle ère de réseaux unifiés, de confiance zéro et de protection accrue de la vie privée". W Cybersécurité des maisons intelligentes, 185–213. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch5.
Pełny tekst źródłaSAMMOUD, Amal, Omessaad HAMDI, Mohamed-Aymen CHALOUF i Nicolas MONTAVONT. "Apports de la biométrie et de l’intelligence artificielle dans la sécurisation de l’IoT". W La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 205–30. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch8.
Pełny tekst źródłaADENIYA, Jihane kèmi. "Le numérique à l’ère de la Covid-19 : quelles conséquences pour le monde du droit ?" W Les épidémies au prisme des SHS, 183–90. Editions des archives contemporaines, 2022. http://dx.doi.org/10.17184/eac.6004.
Pełny tekst źródłaN, Umasankari, i Muthukumar B. "Secured ICA Technique on Bimodal Biometric Images Using Private Watermarking with DCT". W Intelligent Systems and Computer Technology. IOS Press, 2020. http://dx.doi.org/10.3233/apc200115.
Pełny tekst źródłade Terwangne, Cécile. "Les droits fondamentaux à la vie privée et à la protection des données personnelles des migrants et des réfugiés". W Les données numériques des migrants et des réfugiés sous l'angle du droit européen, 97–116. Presses universitaires de Rennes, 2020. http://dx.doi.org/10.3917/pur.turgi.2020.01.0097.
Pełny tekst źródłaBAUJARD, Corinne. "Télétravail malgré soi et confinement lors de la pandémie Covid-19". W Les épidémies au prisme des SHS, 221–28. Editions des archives contemporaines, 2022. http://dx.doi.org/10.17184/eac.6008.
Pełny tekst źródłaStreszczenia konferencji na temat "Techniques de protection de la vie privée"
Araújo de Souza, Maykon, i Sandro Ronaldo Bezerra Oliveira. "Adequação da MOSE® Competence para a Implementação do Capítulo VII da LGPD: Um Mapeamento dos Ativos de Segurança e Boas Práticas". W Computer on the Beach. São José: Universidade do Vale do Itajaí, 2021. http://dx.doi.org/10.14210/cotb.v12.p193-200.
Pełny tekst źródłaZachos, Mark, Pratik Satam i Rami Naama. "Vehicle Cyber Engineering (VCE) Testbed with CLaaS (Cyber-Security Labs as a Service)". W WCX SAE World Congress Experience. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2024. http://dx.doi.org/10.4271/2024-01-2796.
Pełny tekst źródłaRaporty organizacyjne na temat "Techniques de protection de la vie privée"
Gautrais, Vincent, i Nicolas Aubin. Modèle d'évaluation des facteurs relatifs à la circulation des données: Instrument de protection de la vie privée et des droits et libertés dans le développement et l’usage de l’intelligence artificielle. Observatoire international sur les impacts sociétaux de l'IA et du numérique, marzec 2022. http://dx.doi.org/10.61737/rrlb1735.
Pełny tekst źródła