Literatura científica selecionada sobre o tema "Mécanisme de gestion de la confiance"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Índice
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Mécanisme de gestion de la confiance".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Mécanisme de gestion de la confiance"
Dureau, Romain, e Philippe Jeanneaux. "Importance de la confiance dans la gestion collective des risques de pullulation de ravageurs". Cahiers Agricultures 32 (2023): 14. http://dx.doi.org/10.1051/cagri/2023006.
Texto completo da fonteGardès, Nathalie, e Isabelle Maque. "La compétence relationnelle de l’entreprise". Revue internationale P.M.E. 25, n.º 2 (28 de maio de 2013): 129–57. http://dx.doi.org/10.7202/1015802ar.
Texto completo da fonteBettache, Mustapha. "La concertation patronale-syndicale au Québec : consultation ou décision conjointe? Des différences de perception et retombées sur la mobilisation des employés". Revue multidisciplinaire sur l'emploi, le syndicalisme et le travail 5, n.º 1 (1 de março de 2010): 27–69. http://dx.doi.org/10.7202/039359ar.
Texto completo da fonteBaudry, Bernard. "Qualité des produits et coordination dans la relation de sous-traitance : une analyse économique de la procédure de certification industrielle". Notes de recherche 12, n.º 4 (16 de fevereiro de 2012): 57–75. http://dx.doi.org/10.7202/1008665ar.
Texto completo da fonteJaccard Merlin, Odile. "AMÉLIORER LA GESTION COGNITIVE ET ÉMOTIONNELLE D’ENFANTS ET ADOLESCENTS ÂGÉS DE 11 À 14 ANS ATTEINTS DE TROUBLES DU NEURODÉVELOPPEMENT". Cortica 2, n.º 1 (20 de março de 2023): 215–48. http://dx.doi.org/10.26034/cortica.2023.3802.
Texto completo da fontePlaisance, Guillaume. "Accroître l’impact perçu des associations : le rôle des mécanismes spontanés et spécifiques de gouvernance". Gestion et management public Volume 11 / N° 3, n.º 3 (13 de dezembro de 2023): 97–120. http://dx.doi.org/10.3917/gmp.113.0097.
Texto completo da fonteBriand, Louise, e Guy Bellemare. "Rapports de confiance/surveillance dans les entreprises". Hors thème, n.º 40 (2 de maio de 2011): 227–50. http://dx.doi.org/10.7202/1002423ar.
Texto completo da fonteMansour, Nizar, Chiraz Saidani, Malek Saihi e Samia Laaroussi. "Réseaux sociaux au travail, confiance interpersonnelle et comportement de partage des connaissances". Articles 69, n.º 2 (13 de maio de 2014): 316–43. http://dx.doi.org/10.7202/1025031ar.
Texto completo da fonteMbassi, Jean-Claude, e Richard Nkene Ndeme. "La mobilisation du « health belief model modifié » en communication publique peut-elle contribuer au changement de comportement en période de COVID-19 ?" Communication & management Vol. 20, n.º 2 (14 de fevereiro de 2024): 63–80. http://dx.doi.org/10.3917/comma.202.0063.
Texto completo da fonteCouture, Nancy. "De la confiance en soi à l’exercice de la citoyenneté". Écho de pratique 25, n.º 2 (6 de dezembro de 2013): 247–59. http://dx.doi.org/10.7202/1020833ar.
Texto completo da fonteTeses / dissertações sobre o assunto "Mécanisme de gestion de la confiance"
Masmoudi, Mariam. "Prévention des attaques de confiance en temps réel dans l'IoT social". Electronic Thesis or Diss., Toulouse 3, 2023. http://www.theses.fr/2023TOU30302.
Texto completo da fonteThe social IoT is a new paradigm that enhances the navigability of IoT networks and boosts service discovery by integrating social contexts. Nonetheless, this paradigm faces several challenges that reduce its performance quality. Trust, particularly trust attacks, is one of the most significant challenges. Some users resort to malicious behaviors and launch attacks to propagate malicious services. A trust management mechanism has become a major requirement in Social IoT to prevent these attacks in real-time and ensure trustworthy experiences for end-users. However, few studies have addressed trust management issues to prevent trust attacks in Social IoT environments. Most studies have been conducted to detect offline attacks with or without specifying the type of attack performed. Moreover, they did not consider security properties, such as cryptography, transparency, and immutability, etc. In fact, we must continuously process transactions to prevent these attacks at the transaction generation level while maintaining security properties. For this, we compared the previously used techniques and technologies, whose common point is attack prevention in the SN and IoT areas. Based on these comparisons, we indicated that blockchain technology can assist in developing a trust management mechanism that can prevent trust attacks while maintaining security. For real-time prevention, we proposed the combination of a distributed stream processing engine, known as Apache Spark, with blockchain technology. Our choice is based on a comparison of open-source data-stream processing engines. As a result, we propose a new trust management mechanism, based on blockchain and Apache Spark. This mechanism permit to prevent in real-time all trust attack types performed by malicious nodes, in order to obtain a reliable environment. Experimentation made on a real data-set enable us to prove the performance of our proposition
Neuville, Jean-Philippe. "Le contrat de confiance : étude des mécanismes de coopération dans le partenariat industriel autour de deux grands constructeurs automobiles européens". Paris, Institut d'études politiques, 1996. http://www.theses.fr/1996IEPP0005.
Texto completo da fonteThe industrial partnership is one of the possible forms of the organized action between market and hierarchy. With the tools of the sociological analysis of organizations, an empirical comparison of two partnerships is carried out in the automobile manufacturing sector in europe. Results show that this form of industrial cooperation is characterized, first by a common framework : quality ; second; by a specific regulation mecanism : trust ; finally, by a structure of social exchange in which economic exchange is embedded in : interpersonal networks
Chaulet, Johann. "La confiance médiatisée : la confiance et sa gestion au sein des communications médiatisées". Toulouse 2, 2007. https://hal.archives-ouvertes.fr/tel-01252308.
Texto completo da fonteThis thesis is about the usages of mediated communication devices. Its aim is to understand how their generalization renews the way people “equip” and deal with their trust relationships. This interest for the notion of trust leads us to place the questions of information, availability, commitment and surveillance in the center of our analysis. Due to the pertinence of this broadening the study of “close relationships” has been complemented by relations centered around a specific goal (via the study of internet connecting websites) and contractual relationships in very equipped work places (in call centers). The diversity of these situations allows us to examine the confrontation of the two main concepts of mediation and trust. It seems that, if these mediations don't change the main grounds of trust, they do modify some aspects of relations to others and the uncertainty they imply. Our findings document the hypothesis of growing rationalization of communication and relational practices based, mainly, on new information that those always more numerous mediations produce
Vu, Van-Hoan. "Infrastructure de gestion de la confiance sur internet". Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2010. http://tel.archives-ouvertes.fr/tel-00611839.
Texto completo da fonteMasmoudi, Khaled. "Gestion de la confiance dans les réseaux personnels". Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0002.
Texto completo da fonteWith the advent of new networking paradigms and evolutions, spanning from distributed and self-organized systems such as ad hoc networks, P2P networks or grids, to pervasive computing, wireless mesh networks or embedded devices, many research effort have been conducted to bring the previous theoretic concepts into real life. Security protocols have to fulfill a new requirement : how is it possible to establish trust between parties without any a priori credential, central administration or shared context ? We go even farther in this dissertation : what if each single party was a heterogeneous distributed domain ? This thesis builds a layered architecture with a set of cryptographic protocols, meant to establish trust between devices and services belonging to different users through their Personal Networks. In the first part, the trust vector is an out-of-band channel, based on proximity. The resulting protocols combine identity-based cryptography to link identities to cryptographic material, and cryptographically-generated addresses to provide identity ownership. These new identifiers form a novel namespace that allows cross-layer trust establishment. The de facto security negotiation protocols, namely Internet Key Exchange protocol and Transport layer Security handshake sub-protocol, provide end-to-end secure tunnel establishment, but fail to fit scenarios when a domain controller has to define the security parameters for a device under its supervision. We define in the second part of this dissertation how extensions could be applied to fullfill the previous requirement and delegate tunnel negotiation to a third party. Security validation results and the details of a preliminary implementation are also provided. Last, we design a framework for establishing trust basing on the entity behavior within a group of Personal Networks that share a part of their devices and services. Focusing on service discovery, we show that reputation-based trust can be applied to mitigate selfishness and fake announcements in a federation of Personal Networks
Dementhon, Agathe. "De la confiance aux représentations sociales : un nouvel éclairage théorique du concept de confiance : le cas de la confiance dans l'achat industriel". Paris 10, 2001. http://www.theses.fr/2001PA100013.
Texto completo da fonteWazan, Ahmad Samer. "Gestion de la confiance dans les infrastructures à clés publiques". Toulouse 3, 2011. http://thesesups.ups-tlse.fr/1450/.
Texto completo da fonteToday, the Internet has become a universal community, where the openness to diverse application areas, has been accompanied by a natural change in the profile of users. However, in this environment, the maturity of the services and applications is suffering from a problem of trust. The establishment of trust in the Internet requires the intervention of several elements. We refer to these elements by the term: trust chain. In all chains of trust, public key infrastructure (PKI) is a central element. It serves to establish a link between a public key and a physical entity whose certificate signed by a central entity called a certification authority (CA). Thus, PKIs provide means for the management and the distribution of keys and certificates. All elements of the trust chain create a trust management problem. We have dedicated our work, however, to PKIs, and more precisely in trust management of CAs. We have performed the following steps: • We have proposed a formal definition of trust in CAs. • We have defined an architecture that operates a validation service deployed by an entity independent of CAs, and recognized by a community of interest. • We have defined a calculation model that enables us to obtain a score between 0 and 1 representing the quality of a certificate (QoCER). Finally, we have implemented a prototype that demonstrates our ideas. In particular, we have presented how end users can interact with the validation service to make informed decisions about certificates
Hasrouny, Hamssa. "Gestion de confiance et solutions de sécurité pour les réseaux véhiculaires". Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0001/document.
Texto completo da fonteVANETs (Vehicular Ad-hoc Networks) consist of vehicles capable of exchanging information by radio to improve road safety (alerts in case of accidents or in case of abnormal slowdowns, collaborative driving…) or allow internet access for passengers (collaborative networks, infotainment, etc.). Road safety messages exchanged between vehicles may be falsified or eliminated by malicious entities in order to cause accidents and endanger people life. In this thesis, we focus on defining, designing and evaluating a security solution for V2V communications in VANET, to ensure a secure communication and a good level of confidence between the different participating vehicles. Adopting a group-based model, we consider the Trustworthiness evaluation of vehicles participating in VANET and we develop a Trust Model to analyze the behavior of the vehicles in the group while preserving the privacy of the participants and maintaining low network overhead. We then propose a hierarchical and modular framework for Misbehavior Detection and Revocation Management
Hasrouny, Hamssa. "Gestion de confiance et solutions de sécurité pour les réseaux véhiculaires". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0001.
Texto completo da fonteVANETs (Vehicular Ad-hoc Networks) consist of vehicles capable of exchanging information by radio to improve road safety (alerts in case of accidents or in case of abnormal slowdowns, collaborative driving…) or allow internet access for passengers (collaborative networks, infotainment, etc.). Road safety messages exchanged between vehicles may be falsified or eliminated by malicious entities in order to cause accidents and endanger people life. In this thesis, we focus on defining, designing and evaluating a security solution for V2V communications in VANET, to ensure a secure communication and a good level of confidence between the different participating vehicles. Adopting a group-based model, we consider the Trustworthiness evaluation of vehicles participating in VANET and we develop a Trust Model to analyze the behavior of the vehicles in the group while preserving the privacy of the participants and maintaining low network overhead. We then propose a hierarchical and modular framework for Misbehavior Detection and Revocation Management
Coste, Benjamin. "Détection contextuelle de cyberattaques par gestion de confiance à bord d'un navire". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0106/document.
Texto completo da fonteNavigation and ship’s management are two essential aspects for the security of the ship itself and people on board as much as the maritime environment protection. Modern ships ensure these functions by increasingly embedding connected and automated technologies such as sensors, actuators, programmable logic controllers and pieces of software. However, the security of this objects as well as the trust in the information they produce cannot be guaranteed: they can be deceived or under the control of a malicious third party. In this context, a novel approach of data falsification detection is proposed. It is based on trust assessment of information system components which can be seen as inter-related functional blocks producing, processing and receiving pieces of information. The trust one can have inproduction blocks, called information sources, is assessed through its ability to report real situation of the ship. Trust is then propagated to the remainder part of the system. A simulator was made thanks to which we experiment several scenarios including intentional modification of numerical data. In these cases and under some conditions, the variability of trust give us the ability to identify the attack occurrence as much as its target. Our proposition is not restricted to naval information systems and can be employed in various situations even with human factor
Livros sobre o assunto "Mécanisme de gestion de la confiance"
Institut de socio-économie des entreprises et des organisations., ed. Confiance et gestion. Grenoble: Presses Universitaires de Grenoble, 1998.
Encontre o texto completo da fonteLuhmann, Niklas. La confiance: Un mécanisme de réduction de la complexité sociale. Paris: Economica, 2006.
Encontre o texto completo da fonteLethielleux, Laëtitia. L'essentiel de la gestion des ressources humaines. 3a ed. Paris: Gualino-Lextenso éd., 2009.
Encontre o texto completo da fonteSchutz, Will. L' Élément humain: Comprendre le lien entre estime de soi, confiance et performance. Paris: Intereditions, 2006.
Encontre o texto completo da fonteApril, Gaston. Le choc des croyances pour un management du XXIIe siècle. Notre-Dame-des-Neiges, Qc: Éditions Trois-Pistoles, 2003.
Encontre o texto completo da fonteYoung, Jeffrey E. Je réinvente ma vie: Vous valez mieux que vous ne pensez. Montréal, Qué: Éditions de l'Homme, 2003.
Encontre o texto completo da fonteYoung, Jeffrey E. Je réinvente ma vie: Vous valez mieux que vous ne pensez. [Montréal]: Éditions de l'Homme, 1995.
Encontre o texto completo da fonteRagnar, Löfstedt, e Cvetkovich George, eds. Social trust and the management of risk. London: Earthscan, 1999.
Encontre o texto completo da fonteMichael, Siegrist, Earle Timothy C e Gutscher Heinz, eds. Trust in cooperative risk management: Uncertainty and scepticism in the public mind. London: Earthscan, 2007.
Encontre o texto completo da fonteTracy, Diane. Truth, trust, and the bottom line: 7 steps to trust-based management. Chicago Ill: Dearborn Trade, 2001.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Mécanisme de gestion de la confiance"
Anctil, Pierre. "L’accommodement raisonnable dans le contexte légal canadien: mécanisme de gestion de la diversité ou source de tensions". In Travelling Concepts, 27–46. Wiesbaden: VS Verlag für Sozialwissenschaften, 2010. http://dx.doi.org/10.1007/978-3-531-92139-6_2.
Texto completo da fonteGaussot, Ludovic, e Nicolas Palierne. "Chapitre II. Gestion de l’information et gestion des consommations". In La confiance dans les relations familiales, 73–116. Presses universitaires de Rennes, 2020. http://dx.doi.org/10.4000/books.pur.148615.
Texto completo da fonteCastiglione, Dario. "Les conceptions de la confiance : du mécanisme social au principe normatif". In La dynamique confiance / méfiance dans les démocraties multinationales, 17–32. Les Presses de l’Université de Laval, 2012. http://dx.doi.org/10.1515/9782763799186-002.
Texto completo da fonteVINET, Freddy, e Anne-Marie LEVRAUT. "Principes généraux de la gestion de crise". In Gestion des crises territoriales, 37–62. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9080.ch2.
Texto completo da fonte"Services de confiance". In Loi type de la CNUDCI sur l'utilisation et la reconnaissance internationale de la gestion de l'identité et des services de confiance, 70–79. United Nations, 2024. http://dx.doi.org/10.18356/9789210028547c011.
Texto completo da fonte"Services de confiance". In Loi type de la CNUDCI sur l'utilisation et la reconnaissance internationale de la gestion de l'identité et des services de confiance, 18–24. United Nations, 2024. http://dx.doi.org/10.18356/9789210028547c005.
Texto completo da fonteMOVAHEDI, Zeinab. "Le déchargement intelligent des calculs dans le contexte du Mobile Cloud Computing". In Gestion et contrôle intelligents des réseaux, 153–78. ISTE Group, 2020. http://dx.doi.org/10.51926/iste.9008.ch6.
Texto completo da fonteGatfaoui, Shérazade, e Shérazade Gatfaoui. "Management des services". In Management des services, 178–80. Presses universitaires de Grenoble, 2015. http://dx.doi.org/10.3917/pug.abram.2015.01.0178.
Texto completo da fonte"La confiance dans l’organisation scolaire autochtone :". In La gestion de l'éducation dans les écoles des communautés autochtones du Québec, 61–82. Presses de l'Université du Québec, 2020. http://dx.doi.org/10.2307/j.ctv1n35cf9.10.
Texto completo da fonte"Gestion de l’identité". In Loi type de la CNUDCI sur l'utilisation et la reconnaissance internationale de la gestion de l'identité et des services de confiance, 56–69. United Nations, 2024. http://dx.doi.org/10.18356/9789210028547c010.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Mécanisme de gestion de la confiance"
"Formalisation des politiques de sécurité, gestion de la confiance, management de la sécurité". In 2012 National Days of Network Security and Systems (JNS2). IEEE, 2012. http://dx.doi.org/10.1109/jns2.2012.6249229.
Texto completo da fonteRelatórios de organizações sobre o assunto "Mécanisme de gestion de la confiance"
Beaurain, Christophe, Julien Bernard, Iratxe Calvo-Mendieta, Hervé Flanquart, Séverine Frère, Frédéric Gonthier, Anne-Peggy Hellequin e Antoine Le Blanc. Les risques et pollutions industriels sur le territoire dunkerquois: des perceptions à la «concertation». Fondation pour une culture de sécurité industrielle, julho de 2010. http://dx.doi.org/10.57071/255dkr.
Texto completo da fonteDudoit, Alain. Les espaces européens communs de données : une initiative structurante nécessaire et adaptable au Canada. CIRANO, outubro de 2023. http://dx.doi.org/10.54932/ryht5065.
Texto completo da fonte