Literatura científica selecionada sobre o tema "Protection de données"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Índice
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Protection de données".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Protection de données"
Delprat, Laurent. "Protection des données, la nouvelle donne !" Revue d'Orthopédie Dento-Faciale 52, n.º 2 (abril de 2018): 131–32. http://dx.doi.org/10.1051/odf/2018010.
Texto completo da fonteStoeklé, Henri-Corto, Ninon Forster, Mauro Turrini, Philippe Charlier, Christian Hervé, Jean-François Deleuze e Guillaume Vogt. "La propriété des données génétiques". médecine/sciences 34, n.º 12 (dezembro de 2018): 1100–1104. http://dx.doi.org/10.1051/medsci/2018291.
Texto completo da fonteGlassey, Olivier. "Les registres publics à l’ère du numérique". Télescope 18, n.º 1-2 (29 de maio de 2012): 139–54. http://dx.doi.org/10.7202/1009260ar.
Texto completo da fonteChase, Peter. "Protection des données personnelles et gouvernance mondiale des données". RED N° 2, n.º 1 (1 de março de 2021): 140–44. http://dx.doi.org/10.3917/red.002.0140.
Texto completo da fonteBigo, Didier. "Sécurité et protection des données". Cultures & conflits, n.º 74 (1 de setembro de 2009): 7–10. http://dx.doi.org/10.4000/conflits.17425.
Texto completo da fonteVétois, Jacques. "La protection des données personnelles". Terminal, n.º 108-109 (1 de junho de 2011): 195–96. http://dx.doi.org/10.4000/terminal.1362.
Texto completo da fonteFauvet, Jacques. "La protection des données personnelles". Revue internationale de droit comparé 39, n.º 3 (1987): 551–56. http://dx.doi.org/10.3406/ridc.1987.2724.
Texto completo da fonteRoth, Marianne. "Protection des données en psychothérapie". à jour! Psychotherapie-Berufsentwicklung 9, n.º 2 (2023): 52–53. http://dx.doi.org/10.30820/2504-5199-2023-2-52.
Texto completo da fonteLanna, Maximilien. "Données publiques et protection des données personnelles : le cadre européen". Revue française d'administration publique 167, n.º 3 (2018): 501. http://dx.doi.org/10.3917/rfap.167.0501.
Texto completo da fonteTeller, Marina. "La régulation des données de santé : entre intérêt général et intérêts particuliers". Revue internationale de droit économique XXXVI, n.º 3 (21 de abril de 2023): 5–11. http://dx.doi.org/10.3917/ride.363.0005.
Texto completo da fonteTeses / dissertações sobre o assunto "Protection de données"
Dang, Thi Thu Thao. "La protection des données personnelles". Paris 2, 2009. http://www.theses.fr/2009PA020010.
Texto completo da fonteMunoz, Martine. "La protection des échanges de données informatisées". Nice, 1997. http://www.theses.fr/1997NICE0045.
Texto completo da fonteCoudray, Ludovic. "La protection des données personnelles dans l'Union européenne". Paris 2, 2005. http://www.theses.fr/2005PA020094.
Texto completo da fonteCutillo, Leucio Antonio. "Protection des données privées dans les réseaux sociaux". Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00932360.
Texto completo da fonteCutillo, Leucio Antonio. "Protection des données privées dans les réseaux sociaux". Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0020.
Texto completo da fonteOnline Social Network (OSN) applications allow users of all ages and educational background to easily share a wide range of personal information with a theoretically unlimited number of partners. This advantage comes at the cost of increased security and privacy exposures for users, since in all existing OSN applications, to underpin a promising business model, users' data is collected and stored permanently at the databases of the service provider, which potentially becomes a “Big Brother” capable of exploiting this data in many ways that can violate the privacy of individual users or user groups. This thesis suggests and validates a new approach to tackle these security and privacy problems. In order to ensure users' privacy in the face of potential privacy violations by the provider, the suggested approach adopts a distributed architecture relying on cooperation among a number of independent parties that are also the users of the online social network application. The second strong point of the suggested approach is to capitalize on the trust relationships that are part of social networks in real life in order to cope with the problem of building trusted and privacy-preserving mechanisms as part of the online application. Based on these main design principles, a new distributed Online Social Network, namely Safebook, is proposed: Safebook leverages on real life trust and allows users to maintain the control on the access and the usage of their own data. The prototype of Safebook is available at www.safebook.eu
Benzine, Mehdi. "Combinaison sécurisée des données publiques et sensibles dans les bases de données". Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0024.
Texto completo da fonteProtection of sensitive data is a major issue in the databases field. Many software and hardware solutions have been designed to protect data when stored and during query processing. Moreover, it is also necessary to provide a secure manner to combine sensitive data with public data. To achieve this goal, we designed a new storage and processing architecture. Our solution combines a main server that stores public data and a secure server dedicated to the storage and processing of sensitive data. The secure server is a hardware token which is basically a combination of (i) a secured microcontroller and (ii) a large external NAND Flash memory. The queries which combine public and sensitive data are split in two sub queries, the first one deals with the public data, the second one deals with the sensitive data. Each sub query is processed on the server storing the corresponding data. Finally, the data obtained by the computation of the sub query on public data is sent to the secure server to be mixed with the result of the computation on sensitive data. For security reasons, the final result is built on the secure server. This architecture resolves the security problems, because all the computations dealing with sensitive data are done by the secure server, but brings performance problems (few RAM, asymmetric cost of read/write operations. . . ). These problems will be solved by different strategies of query optimization
Jacob, Stéphane. "Protection cryptographique des bases de données : conception et cryptanalyse". Phd thesis, Université Pierre et Marie Curie - Paris VI, 2012. http://tel.archives-ouvertes.fr/tel-00738272.
Texto completo da fonteLefèvre, Pascal. "Protection des contenus multimédias pour la certification des données". Thesis, Poitiers, 2018. http://www.theses.fr/2018POIT2273/document.
Texto completo da fonteFor more than twenty years, technology has become more and more easy to access. It is omnipresent in everyday life and is low cost. It allows anyone using a computer or a smartphone to visualize and modify digital contents. Also, with the impressive progress of online massive data storage (cloud), the quantity of digital contents has soared and continues to increase. To ensure the protection of intellectual property and copyright, knowing if an image has been modified or not is an important information in order to authenticate it. One approach to protect digital contents is digital watermarking. It consists in modifying an image to embed an invisible mark which can authenticate the image. In this doctorate thesis, we first study how to improve the robustness of digital image watermarking against image processings thanks to error correcting codes. By studying the error structure produced by the image processing applied on a watermarked image, we can find an optimal choice of error correcting code for the best correction performances. Also, we propose to integrate a new type of error correcting codes called rank metric codes for watermarking applications. Then, we propose to improve the invisibility of color image watermarking methods. At the embedding step, a host image suffers some distortions which are perceived differently in function of the color by the human visual system. We propose a biological model of color perception which allows one to minimize psychovisual distortions applied on the image to protect
Hadmi, Azhar. "Protection des données visuelles : analyse des fonctions de hachage perceptuel". Thesis, Montpellier 2, 2012. http://www.theses.fr/2012MON20159/document.
Texto completo da fonteThe widespread use of multimedia technology has made it relatively easy to manipulate and tamper visual data. In particular, digital image processing and image manipulation tools offer facilities to intentionally alter image content without leaving perceptual traces. This presents a serious problem, particularly if the authenticity of the digital image is required. The image authentication should be based on their visual content and not on their binary content. Therefore, to authenticate an image, some acceptable manipulations that could undergoes an image, such as JPEG compression and Gaussian noise addition, must tolerated. Indeed, these manipulations preserve the visual appearance of the image. At the same time a perceptual hashing system should be sufficiently sensitive to detect malicious manipulations that modify the interpretation of the semantic content of the imagesuch as adding new objects, deleting or major modification of existing objects.In this thesis, we focus on perceptual hash functions for authentication and integrityverification of digital images. For this purpose, we present all aspects of perceptual hashfunctions. Then, we discuss the constraints that perceptual hashing system must satisfy tomeet desired level of robustness of perceptual signatures. Finally, we present a method toimprove the robustness and security of a system of perceptual hashing
Leukam, Lako Franklin. "Protection des données à caractère personnel pour les services énergétiques". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS004.
Texto completo da fonteSmart grids are important bricks in the fight against climate change. Smart grids allow the massive introduction of renewable energies, which are intermittent, while guaranteeing grid stability, i.e., ensuring a real-time balance between demand and production in the power grid. The management of grid stability is possible thanks to smart meters installed in households, allowing the distribution system operator to collect consumption/production data from consumers/producers at a time step of up to 10 min in France. This real-time consumption data enables to provide new energy services, such as customer consumption forecasts or demand response. Demand response services help to avoid consumption peaks in a neighborhood by ensuring that, at all times, users' consumption does not exceed the maximum power of the local grid. However, the collection of users' consumptions is a key privacy concern. Indeed, individual consumption data reflect the use of all electric appliances by inhabitants in a household over time, and enable to deduce the behaviors, activities, age or preferences of the inhabitants. This thesis aims to propose new energy services, while protecting the privacy of consumers. We propose five contributions that relate to two themes:1- The transformation of a demand response algorithm by making it privacy friendly. This transformation uses secure multiparty computation, allowing to compute an aggregate, such as a sum of users’ consumption, without disclosing any individual consumption.2- The publication of sum of users' consumption while preserving privacy and good utility. This publication uses differential privacy, ensuring that the publication of the sum does not indirectly reveal individual users' consumption. Among other energy services, these sums of consumption enable to perform consumption forecasts
Livros sobre o assunto "Protection de données"
publique, Institut international d'administration, ed. La Protection des données personnelles. Paris: Institut International d'administration publique, 1999.
Encontre o texto completo da fonteDesgens-Pasanau, Guillaume. Protection des données à caractère personnel. Paris: LexisNexis, 2012.
Encontre o texto completo da fonteFlueckiger, Christian. Dopage, santé des sportifs professionnels et protection des données médicales. [Bruxelles]: Bruylant, 2008.
Encontre o texto completo da fonteOrganisation for economic co-operation and development. OECD environmental data: Données OCDE sur l'environnement. Paris, France: Organisation for Economic Co-operation and Development, 1985.
Encontre o texto completo da fonteMoreau, Françoise. Commerce des données sur la population et libertés individuelles. Paris: Institut national d'études démographiques, 2001.
Encontre o texto completo da fonteKessous, Emmanuel. L'attention au monde: Sociologie des données personnelles à l'ère numérique. Paris: Armand Colin, 2012.
Encontre o texto completo da fonteZorn-Macrez, Caroline. Données de santé et secret partagé: Pour un droit de la personne à la protection de ses données de santé partagées. Nancy: Presses universitaires de Nancy, 2010.
Encontre o texto completo da fonteDufournaud, Jean-Luc. Informatique et libertés: Les banques et le traitement des données. Paris: AFB diffusion, 1997.
Encontre o texto completo da fonteJean, Herveg, e Beyleveld Deryck, eds. La protection des données médicales: Les défis du XXIe siècle = The protection of medical data : challenges of the 21st century. Louvain-la-Neuve: Anthemis, 2008.
Encontre o texto completo da fonteJean, Herveg, e Beyleveld Deryck, eds. La protection des données médicales: Les défis du XXIe siècle = The protection of medical data : challenges of the 21st century. Louvain-la-Neuve: Anthemis, 2008.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Protection de données"
Bernelin, Margo. "Protection ou circulation (des données de santé)". In Angles morts du numérique ubiquitaire, 303–4. Nanterre: Presses universitaires de Paris Nanterre, 2023. http://dx.doi.org/10.4000/11ttw.
Texto completo da fonteMesguich, Véronique. "Chapitre 7. La protection des données". In Les bibliothèques face au monde des données, 127–40. Presses de l’enssib, 2023. http://dx.doi.org/10.4000/books.pressesenssib.17775.
Texto completo da fonteCastets-Renard, Céline. "Protection des données personnelles et intelligence artificielle". In Annuaire de droit de l'Union européenne, 797–814. Éditions Panthéon-Assas, 2023. http://dx.doi.org/10.3917/epas.bluma.2022.01.0797.
Texto completo da fonteOulaï, Arthur, Serge Kablan e Patrick Mignault. "L’exigence du consentement en matière de protection des données personnelles du consommateur québécois :". In Revisiter le consumérisme au Québec, 161–80. Presses de l'Université Laval, 2022. http://dx.doi.org/10.2307/j.ctv2j6xfsr.12.
Texto completo da fonteBOUCAUD, Pascale. "Protection de la liberté et de la fragilité de la personne face au robot". In Intelligence(s) artificielle(s) et Vulnérabilité(s) : kaléidoscope, 137–48. Editions des archives contemporaines, 2020. http://dx.doi.org/10.17184/eac.3642.
Texto completo da fonteDesmoulin-Canselier, Sonia. "L’alimentation entre éthique, science et innovation". In L’alimentation entre éthique, science et innovation, 25–40. ESKA, 2024. http://dx.doi.org/10.3917/jibes.344.0025.
Texto completo da fonteJud, Andreas, e René Knüsel. "Développement d’indicateurs pour l’analyse des données multisectorielles d’institutions luttant contre la maltraitance envers les enfants : l’expérience de l’étude suisse Optimus". In La qualité de l'accompagnement en protection de l'enfance, 21–37. L'Harmattan, 2022. http://dx.doi.org/10.3917/har.serap.2022.01.0021.
Texto completo da fonteEnjolras, Laurianne. "Le RGPD, quatre ans après : quel bilan et quelles perspectives pour le droit de la protection des données personnelles ?" In Gouverner par les données ? Pour une sociologie politique du numérique, 211–26. ENS Éditions, 2023. http://dx.doi.org/10.4000/books.enseditions.44963.
Texto completo da fonteFournier-Tombs, Éléonore, Cléa Jullien e Céline Castets-Renard. "Technologies et action humanitaire : pour la protection des « données humanitaires » des apatrides, migrants et réfugiés". In Les intelligences artificielles au prisme de la justice sociale. Considering Artificial Intelligence Through the Lens of Social Justice, 277–98. Les Presses de l’Université de Laval, 2023. http://dx.doi.org/10.1515/9782766301850-012.
Texto completo da fonteSilberman, Roxane. "Chapitre 12. La protection des données individuelles en France et la recherche en sciences sociales". In La France dans les comparaisons internationales, 183–204. Presses de Sciences Po, 2011. http://dx.doi.org/10.3917/scpo.chenu.2011.01.0183.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Protection de données"
Toma, Doina, Adrian Salistean, Georgeta Popescu, Sabina Olaru e Ionela Badea. "A New Modular Solution of Personnel Protective Equipment for the Emergency Responders". In The 9th International Conference on Advanced Materials and Systems. INCDTP - Leather and Footwear Research Institute (ICPI), Bucharest, Romania, 2022. http://dx.doi.org/10.24264/icams-2022.iii.20.
Texto completo da fonteMcDonald, Joseph, Brian Nelson, Brian Olson, Michael E. Iden, Steven G. Fritz e Randell L. Honc. "Locomotive Exhaust Temperatures During High Altitude Tunnel Operation in Donner Pass". In ASME 2008 Internal Combustion Engine Division Spring Technical Conference. ASMEDC, 2008. http://dx.doi.org/10.1115/ices2008-1625.
Texto completo da fonteRelatórios de organizações sobre o assunto "Protection de données"
McAdams-Roy, Kassandra, Philippe Després e Pierre-Luc Déziel. La gouvernance des données dans le domaine de la santé : Pour une fiducie de données au Québec ? Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, fevereiro de 2023. http://dx.doi.org/10.61737/nrvw8644.
Texto completo da fonteGautrais, Vincent, Anne Tchiniaev e Émilie Guiraud. Formulaire du Guide des bonnes pratiques en IA: Disposition de la Loi 25 et bonnes pratiques. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, julho de 2023. http://dx.doi.org/10.61737/pupd4808.
Texto completo da fonteGautrais, Vincent, e Nicolas Aubin. Modèle d'évaluation des facteurs relatifs à la circulation des données: Instrument de protection de la vie privée et des droits et libertés dans le développement et l’usage de l’intelligence artificielle. Observatoire international sur les impacts sociétaux de l'IA et du numérique, março de 2022. http://dx.doi.org/10.61737/rrlb1735.
Texto completo da fonteMeloche, Jean-Philippe, Jérôme Dupras, Andrew Gonzales, Justin Leroux e François Vaillancourt. Étude sur la mise en œuvre d’outils d’écofiscalité au service de la conservation et de l’adaptation aux changements climatiques dans les basses-terres du Saint-Laurent. CIRANO, junho de 2023. http://dx.doi.org/10.54932/kgdx2810.
Texto completo da fonteMeloche, Jean-Philippe, Cédric Bourbonnais, Arnaud Dragicevic, Tejasvi Hora, Noémie Lacroix, Julie Lebert, Justin Leroux et al. Étude sur la mise en œuvre d’outils d’écofiscalité au service de la conservation et de l’adaptation aux changements climatiques dans les basses-terres du Saint-Laurent. CIRANO, junho de 2023. http://dx.doi.org/10.54932/momv7435.
Texto completo da fonteDoyon, Maurice, Stéphane Bergeron e Jacinthe Cloutier. Analyse des préférences des résidents-propriétaires de la ville de Québec pour l’aménagement de bassins de rétention à proximité. CIRANO, junho de 2022. http://dx.doi.org/10.54932/qwaq7409.
Texto completo da fonteLatané, Annah, Jean-Michel Voisard e Alice Olive Brower. Les réseaux de producteurs du Sénégal font face à la COVID-19. RTI Press, setembro de 2021. http://dx.doi.org/10.3768/rtipress.2021.rr.0045.2106.fr.
Texto completo da fonteClark, Louise, Jo Carpenter e Joe Taylor. Des idées pour le travail d’influence : comprendre les chemins d’impact dans la réponse aux crises. Institute of Development Studies, fevereiro de 2024. http://dx.doi.org/10.19088/core.2023.019.
Texto completo da fonteRapport Annuel 2022: Les succès décisifs de notre coalition au cours de l'année 2022. Rights and Resources Initiative, junho de 2023. http://dx.doi.org/10.53892/dnap5451.
Texto completo da fonte