Rozprawy doktorskie na temat „Techniques de protection de la vie privée”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Techniques de protection de la vie privée”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Balu, Raghavendran. "Privacy-aware and scalable recommender systems uing sketching techniques". Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S047/document.
Pełny tekst źródłaIn this thesis, we aim to study and evaluate the privacy and scalability properties of recommender systems using sketching techniques and propose scalable privacy preserving personalization mechanisms. Hence, the thesis is at the intersection of three different topics: recommender systems, differential privacy and sketching techniques. On the privacy aspects, we are interested in both new privacy preserving mechanisms and the evaluation of such mechanisms. We observe that the primary parameter in differential privacy is a control parameter and motivated to find techniques that can assess the privacy guarantees. We are also interested in proposing new mechanisms that are privacy preserving and get along well with the evaluation metrics. On the scalability aspects, we aim to solve the challenges arising in user modeling and item retrieval. User modeling with evolving data poses difficulties, to be addressed, in storage and adapting to new data. Also, addressing the retrieval aspects finds applications in various domains other than recommender systems. We evaluate the impact of our contributions through extensive experiments conducted on benchmark real datasets and through the results, we surmise that our contributions very well address the privacy and scalability challenges
Leukam, Lako Franklin. "Protection des données à caractère personnel pour les services énergétiques". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS004.
Pełny tekst źródłaSmart grids are important bricks in the fight against climate change. Smart grids allow the massive introduction of renewable energies, which are intermittent, while guaranteeing grid stability, i.e., ensuring a real-time balance between demand and production in the power grid. The management of grid stability is possible thanks to smart meters installed in households, allowing the distribution system operator to collect consumption/production data from consumers/producers at a time step of up to 10 min in France. This real-time consumption data enables to provide new energy services, such as customer consumption forecasts or demand response. Demand response services help to avoid consumption peaks in a neighborhood by ensuring that, at all times, users' consumption does not exceed the maximum power of the local grid. However, the collection of users' consumptions is a key privacy concern. Indeed, individual consumption data reflect the use of all electric appliances by inhabitants in a household over time, and enable to deduce the behaviors, activities, age or preferences of the inhabitants. This thesis aims to propose new energy services, while protecting the privacy of consumers. We propose five contributions that relate to two themes:1- The transformation of a demand response algorithm by making it privacy friendly. This transformation uses secure multiparty computation, allowing to compute an aggregate, such as a sum of users’ consumption, without disclosing any individual consumption.2- The publication of sum of users' consumption while preserving privacy and good utility. This publication uses differential privacy, ensuring that the publication of the sum does not indirectly reveal individual users' consumption. Among other energy services, these sums of consumption enable to perform consumption forecasts
Duguépéroux, Joris. "Protection des travailleurs dans les plateformes de crowdsourcing : une perspective technique". Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S023.
Pełny tekst źródłaThis work focuses on protecting workers in a crowdsourcing context. Indeed, workers are especially vulnerable in online work, and both surveillance from platforms and lack of regulation are frequently denounced for endangering them. Our first contribution focuses on protecting their privacy, while allowing usages of their anonymized data for, e.g. assignment to tasks or providing help for task-design to requesters. Our second contribution considers a multi-platform context, and proposes a set of tools for law-makers to regulate platforms, allowing them to enforce limits on interactions in various ways (to limit the work time for instance), while also guaranteeing transparency and privacy. Both of these approaches make use of many technical tools such as cryptography, distribution, or anonymization tools, and include security proofs and experimental validations. A last, smaller contribution, draws attention on a limit and possible security issue for one of these technical tools, the PIR, when it is used multiple times, which has been ignored in current state-of-the-art contributions
Lolies, Isabelle. "La protection pénale de la vie privée". Aix-Marseille 3, 1998. http://www.theses.fr/1998AIX32060.
Pełny tekst źródłaNitard, Evelyne. "La Vie privée des personnes célèbres". Paris 10, 1987. http://www.theses.fr/1987PA100146.
Pełny tekst źródłaTo deal with the private life of famous people is to get in difficulty immediately because such a subject introduces antinomic notions that must be tried to be conciliated daily. Different persons - the famous people, the media and the public - are implicated as asserting opposed moral and financial points of view and interests. To assure the protection of famous persons' private life, we must examine quality and quantity of regularly committed slurs, then we must try to form a true notion of private life and finally we must investigate which sanctions are considered and which are possible
Morgenroth, Thomas. "La vie privée en droit du travail". Thesis, Lille 2, 2016. http://www.theses.fr/2016LIL20016/document.
Pełny tekst źródłaBecause of its relativity, the concept of privacy is a difficult notion to define. French legislation defines it in different ways both between public institutions and citizens as well as among individuals. Moreover, the right to privacy presents an ambivalence as it gives an individual both a freedom of choice and a right of control. Therefore, privacy challenges employment laws which cannot deal satisfactorily with it as work relation has the specificity to create a link of subordination between private individuals. Yet, many of these dispositions contribute to protecting privacy. Though, in its civil law conception, there is some difficulty in resorting to privacy when it focuses on the secret of privacy.Paradoxically, the cases related to this subjective law and employees' privacy secret protection are far and few between. This freedom of privacy tends to ensure employees' protection in their privacy. Nevertheless, this freedom also applies in professional life and consequently appears as an essential instrument of the employee's protection in the workplace. Thus, the right for the employee's privacy to be respected inevitably tends to broaden its scope to the protection of freedom of privacy
Ajam, Nabil. "Privacy protection for location-based services". Télécom Bretagne, 2010. http://www.theses.fr/2010TELB0124.
Pełny tekst źródłaIn this dissertation, we propose the expression and the modelling of the most important principles of privacy. We deduce the relevant privacy requirements that should be integrated in existing security policy models, such as RBAC models. We suggest the application of a unique model for both access control and privacy requirements. Thus, an access control model is to be enriched with new access constraints and parameters, namely the privacy contexts, which should implement the consent and the notification concepts. For this purpose, we introduce the privacy-aware Organisation role Based Access Control (OrBAC) model. The administration of this new model is significantly different from previous models. Three cases are identified. First, the privacy policy may be defined by the data collector but data owners have the possibility to set their preferences through a contracted Service Level Agreement (SLA). Second, the administration model allows legal organisations, for legal purposes, to impose their needs by bypassing user's preferences. Third, we present the case of a privacy policy which is negotiated between the data collector and the requestor based on user's preferences, defined in the SLA. Overall, our proposal is a distributed administration of privacy policies. Focusing on Location Based Services (LBSs), we finally propose a complete privacy framework ready to be deployed in information systems. We use the model prototype to adapt our solution to cellular networks when the requesters are the service providers. This prototype uses parlay gateways with web services. We also extend the set of Parlay X gateway standardised web services by proposing a dedicated privacy web service to enforce privacy protection
Favre, Didier. "De l'homogénéité européenne dans l'insuffisante protection de la vie privée". Montpellier 1, 1992. http://www.theses.fr/1992MON10012.
Pełny tekst źródłaKaim, Guillaume. "Cryptographie post-quantique pour la protection de la vie privée". Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S077.
Pełny tekst źródłaThe past few years have seen the rising of the quantum computers, that are a serious threat to nearly all the actual cryptographic schemes used in practice. In this thesis we propose some new constructions to prevent this obsolescence by building our schemes on the mathematical tool of lattices that is assumed post-quantum resistant. We firstly develop a group signature scheme, allowing each member composing the group to anonymously sign on the behalf of the group. We add a supplementary property, which is the froward secrecy. This property cut the time in periods, such that each secret key is updated when entering a new period. We also propose a blind signature scheme, which is an interactive protocol between an user, who wants to sign a message, with a signer who possesses the signing secret key. We improve the state-of-the art by proposing a constructions without any restart and with a more efficient security. Finally as a use case of the blind signature, we develop an evoting protocol that take as a basis the construction described above
Roca, Gregory. "La vie privée et familiale du majeur protégé". Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM1034.
Pełny tekst źródłaNeglected by the various European legislators for a long time, incapacity Law has been a primary focus since the late nineties. Influenced by the European Council, France has undertaken a more humanistic reform. The new legislation should help to protect the most vulnerable ones while ensuring the exercise of their fundamental rights, including the right for respect of privacy. This dual objective seems both unrealistic and contradictory at the same time since all protection measures lead to capacity restrictions and therefore impact the most intimate decisions the protected adult has to make.Yet, wherever the protected adult live, in the city or in an institution, the llaw seems to have found balance. This is the result of a particular importance given to the natural ability, the will but also the autonomy of the individual.However, the system is not perfect. Sometimes, the legislator did not dare to go further and maintains disabilities by principle in areas the most related to the protected person’s privacy. At other times however, it goes too far choosing autonomy over protection. Improvements are needed. To this end, it is possible to consider the removal of the remaining disabilities and replace them with a protection scheme adjusting to the degree of disability of the individual. It is also possible to imagine a generalization of the assistance which is appropriate when decisions are closely related to the person
Khalifa, Otman. "La protection de la vie privée à l’ère des nouvelles technologies : une protection relative". Thesis, Paris 10, 2019. http://www.theses.fr/2019PA100023.
Pełny tekst źródłaThe right to respect private life is a fundamental right, which is fully protected by the provisions of the law and the provisions of the judiciary at the national and international levels. This fundamental nature requires the state to provide effective methods that protect this right against the dangers surrounding it, the most important of which is the threat of modern information and communication technology. The French and European legislators enacted several legislations that would limit the illegal uses of this technology to private life. However, in recent years, justifications for the security and interests of the state have passed legislation authorizing public authorities to use high-tech devices to spy on people's lives and to monitor their private communications without adequate legal safeguards, which has increasingly weakened the scope of privacy protection. Moreover, the dominant Internet companies are now a real threat to the privacy of Internet users. The violations carried out by these companies outweigh the danger of states and legally and realistically exclude the authority of the French and European control bodies. Finally, the actual legal protection mechanisms, in the absence of financial and technical possibilities and the absence of a binding international convention on privacy, would not be able to provide effective legal protection to this fundamental right
Fouladgar, Sépideh. "Protocoles de protection de la vie privée pour les systèmes RFID". Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0013.
Pełny tekst źródłaElkhiyaoui, Kaoutar. "Sécurité et protection de la vie privée dans les systèmes RFID". Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00990228.
Pełny tekst źródłaElkhiyaoui, Kaoutar. "Sécurité et protection de la vie privée dans les systèmes RFID". Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0040.
Pełny tekst źródłaWhile RFID systems are one of the key enablers helping the prototype of pervasive computer applications, the deployment of RFID technologies also comes with new privacy and security concerns ranging from people tracking and industrial espionage to produ ct cloning and denial of service. Cryptographic solutions to tackle these issues were in general challenged by the limited resources of RFID tags, and by the formalizations of RFID privacy that are believed to be too strong for such constrained devices. It follows that most of the existing RFID-based cryptographic schemes failed at ensuring tag privacy without sacrificing RFID scalability or RFID cost effectiveness. In this thesis, we therefore relax the existing definitions of tag privacy to bridge the gap between RFID privacy in theory and RFID privacy in practice, by assuming that an adversary cannot continuously monitor tags. Under this assumption, we are able to design sec ure and privacy preserving multi-party protocols for RFID-enabled supply chains. Namely, we propose a protocol for tag ownership transfer that features constant-time authentication while tags are only required to compute hash functions. Then, we tackle the problem of product genuineness verification by introducing two protocols for product tracking in the supply chain that rely on storage only tags. Finally, we present a solution for item matching that uses storage only tags and aims at the automation of safety inspections in the supply chain.The protocols presented in this manuscript rely on operations performed in subgroups of elliptic curves that allow for the construction of short encryptions and signatures, resulting in minimal storage requirements for RFID tags. Moreover, the privacy and the security of these protocols are proven under well defined formal models that take into account the computational limitations of RFID technology and the stringent privacy and security requirements of each targeted supply chain application
Chauvet, Delphine. "La vie privée : étude de droit privé". Thesis, Paris 11, 2014. http://www.theses.fr/2014PA111006.
Pełny tekst źródłaPrivacy is a jurisprudential notion, recently established by the legislator. Nevertheless, it’s not yet clearly defined. Privacy lies within an utterly variable context. Consequently, its domain and legal system are difficult to determine. However, notions such as intimacy, identity and personality help apprehending the concept of privacy.The evolution of society and the spreading of new technologies have impacts on privacy. Jeopardized, it has to be better protected. French courts and European Court of Human Rights are attempting at this necessity.If privacy is subjected to a right of respect, its dispute isn’t limited to defense. Privacy also contributes to personal development.Yet, right of privacy is relative insofar as it draws antagonist interests, such as general interest and various particular interests.This study contributes to apprehending privacy with regard to the Law
Kumar, Amrit. "Titre : sécurité et protection de la vie privée pour le calcul déporté". Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM093/document.
Pełny tekst źródłaHashing and hash-based data structures are ubiquitous. Apart from their role inthe design of efficient algorithms, they particularly form the core to manycritical software applications. Whether it be in authentication on theInternet, integrity/identification of files, payment using Bitcoins, webproxies, or anti-viruses, the use of hashing algorithms might only be internalbut yet very pervasive.This dissertation studies the pitfalls of employing hashing and hash-based datastructures in software applications, with a focus on their security and privacyimplications. The mainstay of this dissertation is the security and privacyanalysis of software solutions built atop Bloom filters --- a popularhash-based data structure, and Safe Browsing --- a malicious websitedetection tool developed by Google that uses hash functions. The softwaresolutions studied in this dissertation have billions of clients, which includesoftware developers and end users.For Bloom filters and their privacy, we study a novel use case, where they forman essential tool to privately query leaked databases of personal data. Whilefor security, we study Bloom filters in adversarial settings. The studyencompasses both theory and practice. From a theoretical standpoint, we defineadversary models that capture the different access privileges of an adversary onBloom filters. We put the theory into practice by identifying several securityrelated software solutions (employing Bloom filters) that are vulnerable to ourattacks. This includes: a web crawler, a web proxy, a malware filter, forensictools and an intrusion detection system. Our attacks are similar to traditionaldenial-of-service attacks capable of bringing the concerned infrastructures toknees.As for Safe Browsing, we study vulnerabilities in the architecture that anadversary can exploit. We show several attacks that can simultaneouslyincrease traffic towards both the Safe Browsing server and the client. Ourattacks are highly feasible as they essentially require inverting hash digestsof 32 bits. We also study the privacy achieved by the service by analyzing thepossibility of re-identifying websites visited by a client. Our analysis andexperimental results show that Safe Browsing can potentially be used as a toolto track specific classes of individuals.This dissertation highlights the misunderstandings related to the use of hashingand hash-based data structures in a security and privacy context. Thesemisunderstandings are the geneses of several malpractices that include the useof insecure hash functions, digest truncation among others. Motivated by ourfindings, we further explore several countermeasures to mitigate the ensuingsecurity and privacy risks
Schweppe, Hendrik. "Sécurité et protection de la vie privée dans les systèmes embarqués automobiles". Thesis, Paris, ENST, 2012. http://www.theses.fr/2012ENST0062/document.
Pełny tekst źródłaElectronic equipment has become an integral part of a vehicle's network architecture, which consists of multiple buses and microcontrollers called Electronic Control Units (ECUs). These ECUs recently also connect to the outside world. Navigation and entertainment system, consumer devices, and Car2X functions are examples for this. Recent security analyses have shown severe vulnerabilities of exposed ECUs and protocols, which may make it possible for attackers to gain control over a vehicle. Given that car safety-critical systems can no longer be fully isolated from such third party devices and infotainment services, we propose a new approach to securing vehicular on-board systems that combines mechanisms at different layers of the communication stack and of the execution platforms. We describe our secure communication protocols, which are designed to provide strong cryptographic assurances together with an efficient implementation fitting the prevalent vehicular communication paradigms. They rely on hardware security modules providing secure storage and acting as root of trust. A distributed data flow tracking based approach is employed for checking code execution against a security policy describing authorized communication patterns. Binary instrumentation is used to track data flows throughout execution (taint engine) and also between control units (middleware), thus making it applicable to industrial applications. We evaluate the feasibility of our mechanisms to secure communication on the CAN bus, which is ubiquitously implemented in cars today. A proof of concept demonstrator also shows the feasibility of integrating security features into real vehicles
Schweppe, Hendrik. "Sécurité et protection de la vie privée dans les systèmes embarqués automobiles". Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0062.
Pełny tekst źródłaElectronic equipment has become an integral part of a vehicle's network architecture, which consists of multiple buses and microcontrollers called Electronic Control Units (ECUs). These ECUs recently also connect to the outside world. Navigation and entertainment system, consumer devices, and Car2X functions are examples for this. Recent security analyses have shown severe vulnerabilities of exposed ECUs and protocols, which may make it possible for attackers to gain control over a vehicle. Given that car safety-critical systems can no longer be fully isolated from such third party devices and infotainment services, we propose a new approach to securing vehicular on-board systems that combines mechanisms at different layers of the communication stack and of the execution platforms. We describe our secure communication protocols, which are designed to provide strong cryptographic assurances together with an efficient implementation fitting the prevalent vehicular communication paradigms. They rely on hardware security modules providing secure storage and acting as root of trust. A distributed data flow tracking based approach is employed for checking code execution against a security policy describing authorized communication patterns. Binary instrumentation is used to track data flows throughout execution (taint engine) and also between control units (middleware), thus making it applicable to industrial applications. We evaluate the feasibility of our mechanisms to secure communication on the CAN bus, which is ubiquitously implemented in cars today. A proof of concept demonstrator also shows the feasibility of integrating security features into real vehicles
Nadeau, Alain-Robert. "Vie privée et droits fondamentaux : étude de la protection de la vie privée en droit constitutionnel canadien et américain et en droit international". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/NQ57059.pdf.
Pełny tekst źródłaPlateaux, Aude. "Solutions opérationnelles d’une transaction électronique sécurisée et respectueuse de la vie privée". Caen, 2013. https://tel.archives-ouvertes.fr/tel-01009349.
Pełny tekst źródłaBy using one's credit card to make a purchase on the Internet or one's mobile phone to connect to social networks, electronic transactions have become part of one's daily routine, in a seemingly inescapable fashion. Unfortunately, these exchanges involve the transfer of a large amount of personal data. Such computerization is not without consequence. The issues of security and privacy protection are truly present. In this thesis, we address the following issue: how to protect one's personal data in computer systems, focusing on three topical subjects. First, we propose a data management system centered on the user. Thus, when the user browses on the Internet, he/she will be guided and have the opportunity to refer to any of the eight features of the application. The second area deals with the managing of the patient's medical records and access control. We propose an e-health architecture in order to ensure the protection of the patient's personal data both within a health establishment and between separate institutions. Finally, we are interested in the field of electronic banking, and more specifically, online payment. We have suggested three new e-payment protocols ensuring the client's privacy. The first two protocols improve existing ones: 3D -Secure, Ashrafi and Ng. The last and completely new architecture allows to pay on the Internet without disclosing any of the user's banking information. With each of these architectures, come security and privacy requirements. The analysis of existing solutions and new propositions are carried out in accordance with these security requirements. Each architecture presented here ensures privacy and comes with a software proof of concept
Van, Outryve D'Ydewalle Sibylle. "Protection de la vie privée a l'égard du traitement automatisé des données personnelles". Thesis, McGill University, 1997. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=20226.
Pełny tekst źródłaVuillième-Donot, Élise. "La protection de la vie privée dans les pays latins et anglo-saxons". Toulouse 1, 2001. http://www.theses.fr/2001TOU10037.
Pełny tekst źródłaMechanisms of protection of privacy in certain English-speaking and Latin countries such as Spain, France, Italy, Britain, United States of America and Canada (Quebec) : influence of culture and religion, set of privacy laws, freedom of expression or right to information, "right to publicy". . . Entering the Internet era, the protection of personal data becomes a problem and its solution will have to be international
Agostinelli, Xavier. "Le droit à l'information face à la protection civile de la vie privée". Aix-Marseille 3, 1993. http://www.theses.fr/1993AIX32003.
Pełny tekst źródłaBeyond theoretical description surrounding the notion of the right for respect of privacy, the conflict still remains up to date as soon as the promoting of this concept's protection comes to clash the freedom of the press. The law intervention in 1970 didn't refine the problem. Between thye assertion of a too severe defence of people's privacy and the risk of breach to freedom of speach, it's more the judicial research of an ideal balance which rules over the civil proteciton of privacy today. After a first part dedicated to theoretical causes of this balance, this study leads to the analysis of different technics which, under cover of the sovereign appreciation of foot-fault judges, allow the realization or the preservation of this balance
Oglaza, Arnaud. "Système d'aide à la décision pour la protection des données de vie privée". Thesis, Toulouse 1, 2014. http://www.theses.fr/2014TOU10015/document.
Pełny tekst źródłaWe are using more and more devices connected to the Internet. Our smartphones, tablets and now everyday items can share data to make our life easier. Sharing data may harm our privacy and there is a need to control them. However, this task is complex especially for non technical users. To facilitate this task, we present a decision support system, named KAPUER, that proposes high level authorization policies by learning users' privacy preferences. This learning phase is based on a multi criteria approach. We have defined an innovative model of problem solving using meta-criteria to express the different level of abstraction existing in autorisation policies. We also present KAGOP, an aggregation operator using our model of problem solving to take into account interactions between criteria. KAPUER has been implemented in an Android based system and a simulator has been developed to test it
Hirschi, Lucca. "Vérification automatique de la protection de la vie privée : entre théorie et pratique". Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLN019/document.
Pełny tekst źródłaThe information society we belong to heavily relies on secure information exchanges. To exchange information securely, one should use security protocols that specify how communicating agents should behave notably by using cryptographic primitives (e.g. encryption, signature). Given their ubiquitous and critical nature, we need to reach an extremely high level of confidence that they actually meet their goals. Those goals can be various and depend on the usage context but, more and more often, they include privacy properties (e.g. anonymity, unlinkability). Unfortunately, designed and deployed security protocols are often flawed and critical attacks are regularly disclosed, even on protocols of utmost importance, leading to the never-ending cycle between attack and fix.To break the present stalemate, we advocate the use of formal methods providing rigorous, mathematical frameworks and techniques to analyse security protocols. One such method allowing for a very high level of automation consists in analysing security protocols in the symbolic model and modelling privacy properties as equivalences between two systems. Unfortunately, deciding such equivalences is actually undecidable in the general case. To circumvent undecidability, two main approaches have emerged. First, for a bounded number of agents and sessions of the security protocol to analyse, it is possible to symbolically explore all possible executions yielding decision procedures for equivalence between systems. Second, for the general case, one can semi-decide the problem leveraging dedicated abstractions, notably relying on a strong form of equivalence (i.e. diff-equivalence).The two approaches, i.e. decision for the bounded case or semi-decision for the unbounded case, suffer from two different problems that significantly limit their practical impact. First, (symbolically) exploring all possible executions leads to the so-called states space explosion problem caused by the concurrency nature of security protocols. Concerning the unbounded case, diff-equivalence is actually too imprecise to meaningfully analyse some privacy properties such as unlinkability, nullifying methods and tools relying on it for such cases.In the present thesis, we address those two problems, going back and forth between theory and practice. Practical aspects motivate our work but our solutions actually take the form of theoretical developments. Moreover, we make the effort to confirm practical relevance of our solutions by putting them into practice (implementations) on real-world case studies (analysis of real-world security protocols).First, we have developed new partial order reduction techniques in order to dramatically reduce the number of states to explore without loosing any attack. We design them to be compatible with equivalence verification and such that they can be nicely integrated in frameworks on which existing procedures and tools are based. We formally prove the soundness of such an integration in a tool and provide a full implementation. We are thus able to provide benchmarks showing dramatic speedups brought by our techniques and conclude that more protocols can henceforth be analysed.Second, to solve the precision issue for the unbounded case, we propose a new methodology based on the idea to ensure privacy via sufficient conditions. We present two conditions that always imply unlinkability and anonymity that can be verified using existing tools (e.g. ProVerif). We implement a tool that puts this methodology into practice, hence solving the precision issue for a large class of protocols. This novel approach allows us to conduct the first formal analysis of some real-world protocols (some of them being widely deployed) and the discovery of novel attacks
Soos, Mate. "Protocoles de protection de la vie privée et de sécurité pour les RFIDs". Grenoble INPG, 2009. http://www.theses.fr/2009INPG0068.
Pełny tekst źródłaRFID tags are small electronic devices that will be put on almost every item sold. Since RFIDs are so small, they can only use extremely lightweight security protocols, offering a unique challenge to researchers. Security protocols for RFIDs have been in the forefront of academic research in the past years. This thesis outlines what RFIDs are, and describes and analyses multiple RFID security solutions. We present the state of the art in the field of RFIDs, next, we iIIustrate and analyse the Di Pietro-Molva private RFID authentication protocol, detailing its shortcomings and insecurities. Then, we describe the privacy-preserving RFID identification protocol ProblP and analyse its security. An improved version of ProblP. EProbIP, is also presented, which counters the insecurities found in original protocol. Finally, we describe how low hardware-complexity stream ciphers could be used in RFIDs and analyse such ciphers using a SAT sol ver which we improved for this purpose
Faravelon, Aurélien. "Une démarche de conception et d'implémentation de la protection de la vie privée basée sur le contrôle d'accès appliquée aux compositions de services". Thesis, Grenoble, 2013. http://www.theses.fr/2013GRENM036/document.
Pełny tekst źródłaPrivacy is hot topic. Lawyers, technicians and plain people are all concerned by this notion. Nowadays, most discussions focus on the effects of digital tools, such as social media or surveillance software. However, privacy is still ill-defined. Moreover, digital tools which endanger privacy are widely used. Should not we leave privacy aside and accept that we are, maybe more than ever, visible ?In this doctoral thesis, I address this question from a twofold viewpoint. I first inquire into the nature of our digital condition from a philosophical standpoint. I claim that digital artifacts rework the implementation of our frontiers, be them geographical or social. However, I contend that such frontiers are necessary. As I show that code defines the structure and the effects of digital tools, I point out that properties such as privacy management should be addressed right from the conception of software applications.Helping out designers to address such properties is the second issue I tackle. I focus on Service-Oriented Computing as it is a widely used paradigm. Most speci- fically, I deal with the composition of heterogenous and dynamic services. I define access control as an efficient mechanism to protect privacy and I propose a twofold generative approach to secure services compositions. The composition and its access control policies are separately defined at an abstract level. An expert is responsible for each of them. As we promote an abstract description of the application, we free the designer from technical complexity. At runtime, we propose an architecture which selects and protects the actual services by hiding them behind proxies which run the access control policy. Automated model transformations permit to generate the application from its specification. We thus bypass manual programming. We have implemented a modeling and execution environment and applied our approach to a use case in order to validate our work
Kattan, Imad. "Vie privée et informatique : étude comparative de droit français et droit anglais". Université Robert Schuman (Strasbourg) (1971-2008), 2000. http://www.theses.fr/2000STR30018.
Pełny tekst źródłaIn France, a right of privacy was introduced into the french civil code by the law of 17 july 1970 (a new article 9), which declared that "everyone has the right to trespect for his priv ate life". In England, there is no legal right to privacy as such in the law of England. The protection of privacy is ensured by several cases like (trespass, nuisance, breach of confidence. . . ). The situation of the protection of privacy with regard the computer is different. There is, in France and England, law of data protection with regard to the automatic processing of personal data
Jambert, Amandine. "Outils cryptographiques pour la protection des contenus et de la vie privée des utilisateurs". Thesis, Bordeaux 1, 2011. http://www.theses.fr/2011BOR14234/document.
Pełny tekst źródłaPrivacy is, nowadays, inseparable from modern technology. This is the context in which the present thesis proposes new cryptographic tools to meet current challenges.Firstly, I will consider zero-knowledge proofs of knowledge, which allow in particular to reach the anonymity property. More precisely, I will propose a new range proof system and next give the first comparison between all existing solutions to this problem. Then, I will describe a new method to verify a set of ``Groth-Sahaï'' proofs, which significantly decreases the verification time for such proofs.In a second part, I will consider sanitizable signatures which allow, under some conditions, to manipulate (we say ``sanitize'') a signed message while keeping a valid signature of the initial signer. I will first propose a new scheme in the classical case. Next, I will introduce several extensions which enable the signer to obtain better control of the modifications done by the ``sanitizer''. In particular, I will propose a new security model taking into account these extensions and give different schemes achieving those new properties.Finally, I will present different applications of the above cryptographic tools that enhance customer privacy. In particular, I will consider the questions of subscription, use and billing of services and also address the issue of managing protected content in a hierarchical group
Abravanel-Jolly, Sabine. "La protection du secret en droit des personnes et de la famille". Lyon 3, 1999. http://www.theses.fr/1999LYO33026.
Pełny tekst źródłaSpeicys, Cardoso Roberto. "Intergiciel orienté services pour la protection de la vie privée dans les systèmes d'informatique diffuse". Phd thesis, Université Pierre et Marie Curie - Paris VI, 2009. http://tel.archives-ouvertes.fr/tel-00406399.
Pełny tekst źródłaService oriented pervasive computing, where resources and applications are modeled as services, offers a compelling implementation of pervasive computing. In service oriented computing, applications can more easily handle the openness, heterogeneity and dynamics typical of pervasive computing environments. Realization of this view requires a service-oriented middleware that provides the basic features for provision and consumption of pervasive services: namely, service access, service discovery and service composition. The service-oriented middleware is particularly critical for privacy protection in service oriented pervasive computing since privacy vulnerabilities at the middleware layer affect any application using the middleware.
In this thesis, we study how a service oriented middleware affects the privacy of users in pervasive computing environments. Our contribution is a privacy-enhanced middleware that increases privacy protection during service access, discovery and composition. The middleware provides a service access protocol that enables nodes to communicate privately without the problems of public key encryption. The protocol splits messages through multiple paths that resist to attackers controlling a certain number of nodes or networks. It also provides a privacy-enhanced service discovery protocol that uses encoded service descriptions to protect personal information and that reduces the trust requirements of service directories. Since different service descriptions can generate the same encoded data, attackers are unable to identify the original service from the encoded description in service announcements and requests. Finally, the middleware provides a service composition mechanism that allows users to compare the privacy impact of executing service compositions that are functionally equivalent but define different partitions of data among service providers, thus enabling selection of the composition that causes the smallest impact on user privacy. The middleware features are implemented and evaluated in terms of performance and effectiveness.
Our middleware architecture facilitates the development of service-oriented pervasive applications that respect the privacy of individuals. Since the middleware handles the privacy issues introduced by the underlying software platform, applications can focus on application-specific mechanisms for privacy protection. Users that consume services on top of this middleware are also able to more effectively protect their privacy, since they can rely on middleware provided functionalities to better control personal information disclosure.
Chupin, Stéphane-Dimitri. "La protection de la vie personnelle délimitée par les frontières des sphères privée et publique". Paris 1, 2002. http://www.theses.fr/2002PA010286.
Pełny tekst źródłaCardoso, Roberto Speicys. "Intergiciel orienté services pour la protection de la vie privée dans les systèmes d'informatique diffuse". Paris 6, 2009. http://www.theses.fr/2009PA066252.
Pełny tekst źródłaPlateaux, Aude. "Solutions opérationnelles d'une transaction électronique sécurisée et respectueuse de la vie privée". Phd thesis, Université de Caen, 2013. http://tel.archives-ouvertes.fr/tel-01009349.
Pełny tekst źródłaGleize, Bérengère. "La protection de l'image des biens". Montpellier 1, 2005. http://www.theses.fr/2005MON10047.
Pełny tekst źródłaBalgobin, Yann. "Contribution à l'économie de la vie privée et des données financières". Electronic Thesis or Diss., Paris, ENST, 2018. http://www.theses.fr/2018ENST0038.
Pełny tekst źródłaThis thesis investigates the economic consequences of consumers’ control over the level of personal information they are willing to share with firms. This subject is vital for the digital economy as many firms collect and use information about consumers to increase their revenues. Firms may face greater difficulty to generate profit from personal data. Firstly, because consumers are increasingly concerned about their privacy. Secondly, because more and more privacy-enhancing technologies (PETs) become available. We find in the thesis that the use of PETs could positively influence consumers’ willingness to share personal information, enabling a data collection that takes privacy concerns into account. We make similar conclusions in the case of financial information. Developing the use of non-bank payment instruments (and thus allowing consumers to hide some information to banks) could benefit e-commerce, leading consumers to buy more online. Finally, in a context where consumers are concerned with their privacy, banks may benefit from making screening less intrusive, as it would improve their lending strategy
Antignac, Thibaud. "Méthodes formelles pour le respect de la vie privée par construction". Thesis, Lyon, INSA, 2015. http://www.theses.fr/2015ISAL0016/document.
Pełny tekst źródłaPrivacy by Design (PbD) is increasingly praised as a key approach to improving privacy protection. New information and communication technologies give rise to new business models and services. These services often rely on the exploitation of personal data for the purpose of customization. While privacy is more and more at risk, the growing view is that technologies themselves should be used to propose more privacy-friendly solutions. Privacy Enhancing Technologies (PETs) have been extensively studied, and many techniques have been proposed such as anonymizers or encryption mechanisms. However, PbD goes beyond the use of PETs. Indeed, the privacy requirements of a system should be taken into account from the early stages of the design because they can have a large impact on the overall architecture of the solution. The PbD approach can be summed up as ``prevent rather than cure''. A number of principles related to the protection of personal data and privacy have been enshrined in law and soft regulations. They involve notions such as data minimization, control of personal data by the subject, transparency of the data processing, or accountability. However, it is not clear how to translate these principles into technical features, and no method exists so far to support the design and verification of privacy compliant systems. This thesis proposes a systematic process to specify, design, and verify system architectures. This process helps designers to explore the design space in a systematic way. It is complemented by a formal framework in which confidentiality and integrity requirements can be expressed. Finally, a computer-aided engineering tool enables non-expert designers to perform formal verifications of the architectures. A case study illustrates the whole approach showing how these contributions complement each other and can be used in practice
Decker, Micheline. "Aspects internes et internationaux de la protection de la vie privée en droits français, allemand et anglais". Paris 2, 2000. http://www.theses.fr/2000PA020063.
Pełny tekst źródłaJammet, Adrien. "La prise en compte de la vie privée dans l’innovation technologique". Thesis, Lille 2, 2018. http://www.theses.fr/2018LIL2D003/document.
Pełny tekst źródłaThe study of privacy within technological innovations is the study of the legal system surrounding personal data. However, the complexity and context of the subject imposes a pragmatic analysis, gathering elements of economy and technology, to define the reality of the use of the law by and within numerical innovations. As such, it necessitates a phenomenological approach, reviewing the historical steps that lead to the particular set of protections that the legislator has chosen, from a general protection of privacy towards a special regime applicable to personal data, and then an observation of its effectiveness to protect the essence of privacy. At the center of this work, we can find the will to understandthe gap between the trust given by the public to technology regarding the respect of one’s privacy and the declarations of legislators on the efficiency of the legislative response. Since the consent is the core principle of these regulations, this divergence deserves a legal analysis. Consequently, we can sum this thesis by a simple question: what it the real efficiency of privacy’s protection regime facing technological innovations ?
Somé, Dolière Francis. "Sécurité et vie privée dans les applications web". Thesis, Université Côte d'Azur (ComUE), 2018. http://www.theses.fr/2018AZUR4085/document.
Pełny tekst źródłaIn this thesis, we studied security and privacy threats in web applications and browser extensions. There are many attacks targeting the web of which XSS (Cross-Site Scripting) is one of the most notorious. Third party tracking is the ability of an attacker to benefit from its presence in many web applications in order to track the user has she browses the web, and build her browsing profile. Extensions are third party software that users install to extend their browser functionality and improve their browsing experience. Malicious or poorly programmed extensions can be exploited by attackers in web applications, in order to benefit from extensions privileged capabilities and access sensitive user information. Content Security Policy (CSP) is a security mechanism for mitigating the impact of content injection attacks in general and in particular XSS. The Same Origin Policy (SOP) is a security mechanism implemented by browsers to isolate web applications of different origins from one another. In a first work on CSP, we analyzed the interplay of CSP with SOP and demonstrated that the latter allows the former to be bypassed. Then we scrutinized the three CSP versions and found that a CSP is differently interpreted depending on the browser, the version of CSP it implements, and how compliant the implementation is with respect to the specification. To help developers deploy effective policies that encompass all these differences in CSP versions and browsers implementations, we proposed the deployment of dependency-free policies that effectively protect against attacks in all browsers. Finally, previous studies have identified many limitations of CSP. We reviewed the different solutions proposed in the wild, and showed that they do not fully mitigate the identified shortcomings of CSP. Therefore, we proposed to extend the CSP specification, and showed the feasibility of our proposals with an example of implementation. Regarding third party tracking, we introduced and implemented a tracking preserving architecture, that can be deployed by web developers willing to include third party content in their applications while preventing tracking. Intuitively, third party requests are automatically routed to a trusted middle party server which removes tracking information from the requests. Finally considering browser extensions, we first showed that the extensions that users install and the websites they are logged into, can serve to uniquely identify and track them. We then studied the communications between browser extensions and web applications and demonstrate that malicious or poorly programmed extensions can be exploited by web applications to benefit from extensions privileged capabilities. Also, we demonstrated that extensions can disable the Same Origin Policy by tampering with CORS headers. All this enables web applications to read sensitive user information. To mitigate these threats, we proposed countermeasures and a more fine-grained permissions system and review process for browser extensions. We believe that this can help browser vendors identify malicious extensions and warn users about the threats posed by extensions they install
Romanelli, Marco. "Méthodes d'apprentissage machine pour la protection de la vie privée : mesure de leakage et design des mécanismes". Thesis, Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAX045.
Pełny tekst źródłaIn recent years, there has been an increasing involvement of artificial intelligence and machine learning (ML) in countless aspects of our daily lives. In this PhD thesis, we study how notions of information theory and ML can be used to better measure and understand the information leaked by data and / or models, and to design solutions to protect the privacy of the shared information. We first explore the application of ML to estimate the information leakage of a system. We consider a black-box scenario where the system’s internals are either unknown, or too complicated to analyze, and the only available information are pairs of input-output data samples. Previous works focused on counting the frequencies to estimate the input-output conditional probabilities (frequentist approach), however this method is not accurate when the domain of possible outputs is large. To overcome this difficulty, the estimation of the Bayes error of the ideal classifier was recently investigated using ML models and it has been shown to be more accurate thanks to the ability of those models to learn the input-output correspondence. However, the Bayes vulnerability is only suitable to describe one-try attacks. A more general and flexible measure of leakage is the g-vulnerability, which encompasses several different types of adversaries, with different goals and capabilities. We therefore propose a novel ML based approach, that relies on data preprocessing, to perform black-box estimation of the g-vulnerability, formally studying the learnability for all data distributions and evaluating performances in various experimental settings. In the second part of this thesis, we address the problem of obfuscating sensitive information while preserving utility, and we propose a ML approach inspired by the generative adversarial networks paradigm. The idea is to set up two nets: the generator, that tries to produce an optimal obfuscation mechanism to protect the data, and the classifier, that tries to de-obfuscate the data. By letting the two nets compete against each other, the mechanism improves its degree of protection, until an equilibrium is reached. We apply our method to the case of location privacy, and we perform experiments on synthetic data and on real data from the Gowalla dataset. The performance of the obtained obfuscation mechanism is evaluated in terms of the Bayes error, which represents the strongest possible adversary. Finally, we consider that, in classification problems, we try to predict classes observing the values of the features that represent the input samples. Classes and features’ values can be considered respectively as secret input and observable outputs of a system. Therefore, measuring the leakage of such a system is a strategy to tell the most and least informative features apart. Information theory can be considered a useful concept for this task, as the prediction power stems from the correlation, i.e., the mutual information, between features and labels. We compare the Shannon entropy based mutual information to the Rényi min-entropy based one, both from the theoretical and experimental point of view showing that, in general, the two approaches are incomparable, in the sense that, depending on the considered dataset, sometimes the Shannon entropy based method outperforms the Rényi min-entropy based one and sometimes the opposite occurs
Benkhelif, Tarek. "Publication de données personnelles respectueuse de la vie privée : une démarche fondée sur le co-clustering". Thesis, Nantes, 2018. http://www.theses.fr/2018NANT4070/document.
Pełny tekst źródłaThere is a strong economic and civic demand for the opening of individual data. However, the publication of such data poses a risk to the individuals represented in it. This thesis focuses on the problem of anonymizing multidimensional data tables containing individual data for publishing purposes. In particular, two data anonymization approaches families will be focused on: the first aims to merge each individual into a group of individuals, the second is based on the addition of disruptive noise to the original data. Two new approaches are developed in the context of group anonymization. They aggregate the data using a co-clustering technique and then use the produced model, to generate synthetic records, in the case of the first solution. While the second proposal seeks to achieve the formalism of k-anonymity. Finally, we present a new anonymization algorithm “DPCocGen” that ensures differential privacy. First, a data-independent partitioning on the domains is used to generate a perturbed multidimensional histogram, a multidimensional co-clustering is then performed on the noisy histogram resulting in a partitioning scheme. Finally, the resulting schema is used to partition the original data in a differentially private way. Synthetic individuals can then be drawn from the partitions
Augand, André-Jacques. "Respect de la vie privée en matière de nouvelles technologies à travers des études de cas". Thesis, Paris 2, 2015. http://www.theses.fr/2015PA020027.
Pełny tekst źródłaThe development of the Internet and online services have resulted in a proliferation of information collected from users - explicitly or without their knowledge. Furthermore, such information may be disclosed to third parties, or crossed with other data to create user profiles, or contribute to the identification of an individual.-The intensity of human activities in social networks is therefore a breeding ground for potential violations of user privacy. This research aims to study first the socio-economic determinants of the use and adoption of the Internet in a developing society. Then we studied the perception, risk control, and trust perceived by the user of the Internet in the context of online networks (Facebook, LinkedIn, Twitter, Myspace, Viadeo, Hi5 etc.). We developed a questionnaire that was administered to Gabon surfers. Our results showed that socio-economic status and people's living conditions strongly influence the use of the Internet in Libreville and Port-Gentil. Regarding the perceived trust and user behavior, three types of determinants of trust were identified: the website-related factors (social networks), factors related to various public and private organizations of Gabon (Army, police, judiciary, administrations and companies) and factors related to the user (risk aversion). These results are sufficient to relativize the effectiveness of Gabonese policies to ensure broad coverage of countries by ICT supposed to create added value and improve the living standards and social welfare of citizens. From these results, managerial recommendations for managers of social networks and regulatory bodies including the Gabonese National Commission for the Protection of Personal Data (CNPDCP) are proposed. We will propose practices to better protect the privacy of users of online social networks
Da, silva Simon. "Diffusion Vidéo avec une Meilleure Qualité d'Expérience et Respectant la Vie Privée". Thesis, Bordeaux, 2020. http://www.theses.fr/2020BORD0140.
Pełny tekst źródłaVideo streaming is expected to exceed 82% of all Internet traffic in 2022.There are two reasons for this success: the multiplication of video sources and the pervasiveness of high quality Internet connections.Dominating video streaming platforms rely on large-scale infrastructures to cope with an increasing demand for high quality of experience and high-bitrate content.However, the usage of video streaming platforms generates sensitive personal data (the history of watched videos), which leads to major threats to privacy.Hiding the interests of users from servers and edge-assisting devices is necessary for a new generation of privacy-preserving streaming services.This thesis aims at proposing a new approach for multiple-source live adaptive streaming by delivering video content with a high quality of experience to its users (low start-up delay, stable high-quality stream, no playback interruptions) while enabling privacy preservation (leveraging trusted execution environments)
Cherrueau, Ronan-Alexandre. "Un langage de composition des techniques de sécurité pour préserver la vie privée dans le nuage". Thesis, Nantes, Ecole des Mines, 2016. http://www.theses.fr/2016EMNA0233/document.
Pełny tekst źródłaA cloud service can use security techniques to ensure information privacy. These techniques protect privacy by converting the client’s personal data into unintelligible text. But they can also cause the loss of some functionalities of the service. For instance, a symmetric-key cipher protects privacy by converting readable personal data into unreadable one. However, this causes the loss of computational functionalities on this data.This thesis claims that a cloud service has to compose security techniques to ensure information privacy without the loss of functionalities. This claim is based on the study of the composition of three techniques: symmetric cipher, vertical data fragmentation and client-side computation. This study shows that the composition makes the service privacy preserving, but makes its formulation overwhelming. In response, the thesis offers a new language for the writing of cloud services that enforces information privacy using the composition of security techniques. This language comes with a set of algebraic laws to systematically transform a local service without protection into its cloud equivalent protected by composition. An Idris implementation harnesses the Idris expressive type system to ensure the correct composition of security techniques. Furthermore, an encoding translates the language intoProVerif, a model checker for automated reasoning about the security properties found in cryptographic protocols. This translation checks that the service preserves the privacy of its client
Aguilar, Melchor Carlos. "Les communications anonymes à faible latence". Toulouse, INSA, 2006. http://www.theses.fr/2006ISAT0021.
Pełny tekst źródłaIn this thesis, we present different systems providing low-latency anonymous communications. We first study the performance of systems based on well known primitives such as superposed sending and encrypted padding for transmission, and broadcast with implicit addressing for reception, when the group of potential users is restricted to be small, closed, or localized. We propose the usage of Private Information Retrieval (PIR) protocols as an alternative to broadcast with implicit addressing, and we study the resulting systems. These systems allow us to trade communication cost, for computational cost. Through some examples, we show that the new solutions offer a better choice in some situations, specially when the users are connected to the service through the Internet. Then, we put forward how the different approaches are related, and show that the systems based on classic primitives are in fact just some instances of a family, which becomes much larger and versatile through the introduction of PIR protocols
Payraudeau, Christel. "La protection du droit au respect de la vie privée par le Conseil constitutionnel à l’épreuve du numérique". Thesis, Corte, 2022. http://www.theses.fr/2022CORT0006.
Pełny tekst źródłaThe constitutionalisation of the right to privacy has progressively found its place, but with the advent of digital technology, new issues have emerged. Our society has undergone major changes over the last few decades, and even though modern technologies are very attractive due to their undeniable efficiency, they are evolving very fast and the law can thus only intervene too late.In this context and with regard to the supremacy of digital technology, we must question the reality of individual freedoms and fundamental rights. Privacy is shaken up by new practices. These issues are inescapable whatever the global challenges be they security, economic or political ones. It is necessary to analyse how the constitutional Council positions itself in order to better identify its limits. In our digital age, how can the much needed protection of the constitutional Council appear as inadequate as regards the right to privacy ?The purpose of this thesis is to demonstrate that in an ever-evolving technological world, the three themes studied here are inextricably linked: the right to privacy, as with individual freedoms which prevail, digital technology which makes itself indispensable and the constitutional court to guarantee the proper functioning and the management of these notions which could easily become antagonistic. We will identify the constitutional objectives which can be opposed to the right to privacy as well as the guarantees which determine the conciliation of this right with legislative objectives. In our study, we will consider that privacy in the digital virtual world has two sides that the constitutional Council is attempting to guarantee: on the one hand, protecting our relationship with others and on the other hand protecting the individual.It is important to remain critical of the use made of our personal data. With digital technology, the protection of privacy must unquestionably be analysed beyond our national borders. To analyse the dangers which threatens it, it is interesting to look at the study of the constitutional Council decisions in order to be able to compare case law and French legislation to those of other countries. Digital tools, due to their possible impacts on many aspects of our lives, considerably reduce spatial and temporal boundaries, which increasingly appear as obsolete. The digital network can virtually connect people all over the world. Therefore, constitutional protection is today part of a very different context insofar as exercising our freedoms and rights, such as privacy, inevitably has a supranational dimension
Crépin, Ludivine. "Les systèmes multi-agents hippocratiques : mécanismes sociaux entre agents pour la protection de la sphère privée". Saint-Etienne, 2009. http://www.theses.fr/2009STET4019.
Pełny tekst źródłaWith the explosion of the Web and multi-agent technologies, the current evolution of information systems leads to an automatic processing of users' data. The development of user centered multi-agent systems brings a new research topic : the management and the protection of users' sensitive data in order to preserve privacy. This thesis focuses on privacy management coming from the user's delegation to an agent of his sensitive data. Interaction between agents being one of the main feature of a multi-agent system, the possible risks for the sensitive data become more and more important in terms of disclosure, alteration, etc. This thesis primarly focuses on sensitive data communications and on the sensitive data becoming after being sent. In order to consider these important questions about the privacy preservation, we propose the model of Hippocratic Multi-Agent System (HiMAS). This model gives to agent the capacity to manage the sensitive users' data thanks to the notion of private sphere, and to protect this kind of data against suspicious behavior thanks to a specific interaction protocol and some mechanisms for the regulation of the agent behavior as trust and reputation. Our approach is based on a moral and ethic focus in order to assist the many propositions on these problems in security and network research
Moreno, Barbosa Andrés Dario. "Passage à l’échelle des systèmes de recommandation avec respect de la vie privée". Thesis, Nice, 2014. http://www.theses.fr/2014NICE4128/document.
Pełny tekst źródłaThe main objective of this thesis is to propose a recommendation method that keeps in mind the privacy of users as well as the scalability of the system. To achieve this goal, an hybrid technique using content-based and collaborative filtering paradigms is used in order to attain an accurate model for recommendation, under the strain of mechanisms designed to keep user privacy, particularly designed to reduce the user exposure risk. The thesis contributions are threefold : First, a Collaborative Filtering model is defined by using client-side agent that interacts with public information about items kept on the recommender system side. Later, this model is extended into an hybrid approach for recommendation that includes a content-based strategy for content recommendation. Using a knowledge model based on keywords that describe the item domain, the hybrid approach increases the predictive performance of the models without much computational effort on the cold-start setting. Finally, some strategies to improve the recommender system's provided privacy are introduced: Random noise generation is used to limit the possible inferences an attacker can make when continually observing the interaction between the client-side agent and the server, and a blacklisted strategy is used to refrain the server from learning interactions that the user considers violate her privacy. The use of the hybrid model mitigates the negative impact these strategies cause on the predictive performance of the recommendations
Arès, Sébastien. "Le couplage de données et la protection de la vie privée informationnelle sous l'article 8 de la Charte canadienne /". Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82651.
Pełny tekst źródłaIn the author's opinion, a governmental data matching program will probably constitute a search or seizure under section 8 when a positive answer is given to two questions. First, is there a use or transfer of information which implicates constitutionally protected information? Generally, section 8 will only protect biographical personal information, as described in the Plant case. Second, one must determine if a reasonable expectation of privacy exists as to the purpose for which the information will be used. In other words, one must determine if the two governmental databanks are separate on the constitutional level.
However, a positive answer to both of theses questions does not mean that the matching program necessarily infringes section 8. It will not be considered unreasonable if it is authorised by law, if the law itself is reasonable, and if the execution of the program is reasonable. Presuming that the program is authorised by law, it is probable that a matching program aimed to detect individuals collecting illegally social benefits will not be considered unreasonable.