Literatura científica selecionada sobre o tema "Sécurité et confidentialité"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Índice
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Sécurité et confidentialité".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Sécurité et confidentialité"
Jay, Nicolas, e Marc Koehler. "Sécurité et confidentialité des données de traçabilité en milieu de soins". Interbloc 36, n.º 3 (julho de 2017): 153–56. http://dx.doi.org/10.1016/j.bloc.2017.07.005.
Texto completo da fonteDaho, Grégory, Emmanuel-Pierre Guittet e Julien Pomarède. "Les territoires du secret : confidentialité et enquête dans les mondes pluriels de la sécurité". Cultures & conflits, n.º 118 (1 de dezembro de 2020): 7–17. http://dx.doi.org/10.4000/conflits.21827.
Texto completo da fonteDaho, Grégory, Emmanuel-Pierre Guittet e Julien Pomarède. "Les territoires du secret : confidentialité et enquête dans les mondes pluriels de la sécurité". Cultures & conflits, n.º 118 (1 de dezembro de 2020): 7–17. http://dx.doi.org/10.4000/conflits.21827.
Texto completo da fonteTesta, Valerie, Alexandria Bennett, Jeffrey Jutai, Zachary Cantor, Peter Burke, James McMahon, R. Nicholas Carleton et al. "Application du cadre Theoretical Domains Framework pour cerner les préférences des policiers, des pompiers et des ambulanciers en matière d’accès aux soins de santé mentale dans une clinique de traitement des blessures de stress opérationnel pour les premiers répondants : une étude qualitative". Promotion de la santé et prévention des maladies chroniques au Canada 43, n.º 10/11 (novembro de 2023): 481–502. http://dx.doi.org/10.24095/hpcdp.43.10/11.02f.
Texto completo da fonteMarsico, G. "Numérique, virtuel, réseaux sociaux, objets connectés : leviers ou freins à la confiance dans la relation de soins ?" Psycho-Oncologie 14, n.º 1-2 (março de 2020): 53–56. http://dx.doi.org/10.3166/pson-2020-0123.
Texto completo da fonteÖnen, Melek, Francesco Cremonesi e Marco Lorenzi. "Apprentissage automatique fédéré pour l’IA collaborative dans le secteur de la santé". Revue internationale de droit économique XXXVI, n.º 3 (21 de abril de 2023): 95–113. http://dx.doi.org/10.3917/ride.363.0095.
Texto completo da fonteGusev, Alexander, Arnaud Leconte e Simone Lucatello. "Green Digital Transition and Data Governance". L'Europe en Formation 396, n.º 1 (13 de novembro de 2023): 59–83. http://dx.doi.org/10.3917/eufor.396.0059.
Texto completo da fonteTschudi, Hunziker, Kündig, Lüscher, Freiermuth, Heller e Heberer. "Internet-Kommunikation zwischen Hausärzten und Universitätsspital". Praxis 91, n.º 7 (1 de fevereiro de 2002): 257–60. http://dx.doi.org/10.1024/0369-8394.91.7.257.
Texto completo da fonteBarry, Bridget, Rosemary Ricciardelli e Heidi Cramm. "« Nous sommes uniques » : facteurs de stress organisationnels, soutien par les pairs et attitudes à l’égard des soins de santé mentale chez les pompiers d’aéroport". Promotion de la santé et prévention des maladies chroniques au Canada 43, n.º 10/11 (novembro de 2023): 503–14. http://dx.doi.org/10.24095/hpcdp.43.10/11.03f.
Texto completo da fonteKalajdzic, Jasminka. "Access to Justice for the Wrongfully Accused in National Security Investigations". Windsor Yearbook of Access to Justice 27, n.º 1 (1 de fevereiro de 2009): 172. http://dx.doi.org/10.22329/wyaj.v27i1.4567.
Texto completo da fonteTeses / dissertações sobre o assunto "Sécurité et confidentialité"
Cherif, Amina. "Sécurité des RFIDs actifs et applications". Thesis, Limoges, 2021. http://www.theses.fr/2021LIMO0015.
Texto completo da fonteOver the 30 last years, active RFID devices have evolved from nodes dedicated to identification to autonomous nodes that, in addition, sense (from environment or other sources) and exchange data. Consequently, the range of their applications has rapidly grown from identification only to monitoring and real time localisation. In recent years, thanks to their advantages, the use of active RFID nodes for mobile data collection has attracted significant attention. However, in most scenarios, these nodes are unattended in an adverse environments, so data must be securely stored and transmitted to prevent attack by active adversaries: even if the nodes are captured, data confidentiality must be ensured. Furthermore, due to the scarce resources available to nodes in terms of energy, storage and/or computation, the used security solution has to be lightweight. This thesis is divided in two parts. In the first, we will study in details the evolution of active RFID nodes and their security. We will then, present, in the second part, a new serverless protocol to enable MDCs (Mobile Data Collectors), such as drones, to collect data from mobile and static Active RFID nodes and then deliver them later to an authorized third party. The whole solution ensures data confidentiality at each step (from the sensing phase, before data collection by the MDC, once data have been collected by MDC, and during final delivery) while fulfilling the lightweight requirements for the resource-limited entities involved. To assess the suitability of the protocol against the performance requirements, we will implement it on the most resource-constrained secure devices to prove its efficiency even in the worst conditions. In addition, to prove the protocol fulfills the security requirements, we will analyze it using security games and we will also formally verify it using the AVISPA and ProVerif tools
Dubreil, Jérémy. "Vérification et Synthèse de Contrôleur pour des Propriétés de Confidentialité". Phd thesis, Université Rennes 1, 2009. http://tel.archives-ouvertes.fr/tel-00461306.
Texto completo da fonteMartinet, Gwenaëlle. "Contribution à une théorie de la sécurité des implémentations cryptographiques". Paris 7, 2004. http://www.theses.fr/2004PA077195.
Texto completo da fonteSomé, Dolière Francis. "Sécurité et vie privée dans les applications web". Thesis, Université Côte d'Azur (ComUE), 2018. http://www.theses.fr/2018AZUR4085/document.
Texto completo da fonteIn this thesis, we studied security and privacy threats in web applications and browser extensions. There are many attacks targeting the web of which XSS (Cross-Site Scripting) is one of the most notorious. Third party tracking is the ability of an attacker to benefit from its presence in many web applications in order to track the user has she browses the web, and build her browsing profile. Extensions are third party software that users install to extend their browser functionality and improve their browsing experience. Malicious or poorly programmed extensions can be exploited by attackers in web applications, in order to benefit from extensions privileged capabilities and access sensitive user information. Content Security Policy (CSP) is a security mechanism for mitigating the impact of content injection attacks in general and in particular XSS. The Same Origin Policy (SOP) is a security mechanism implemented by browsers to isolate web applications of different origins from one another. In a first work on CSP, we analyzed the interplay of CSP with SOP and demonstrated that the latter allows the former to be bypassed. Then we scrutinized the three CSP versions and found that a CSP is differently interpreted depending on the browser, the version of CSP it implements, and how compliant the implementation is with respect to the specification. To help developers deploy effective policies that encompass all these differences in CSP versions and browsers implementations, we proposed the deployment of dependency-free policies that effectively protect against attacks in all browsers. Finally, previous studies have identified many limitations of CSP. We reviewed the different solutions proposed in the wild, and showed that they do not fully mitigate the identified shortcomings of CSP. Therefore, we proposed to extend the CSP specification, and showed the feasibility of our proposals with an example of implementation. Regarding third party tracking, we introduced and implemented a tracking preserving architecture, that can be deployed by web developers willing to include third party content in their applications while preventing tracking. Intuitively, third party requests are automatically routed to a trusted middle party server which removes tracking information from the requests. Finally considering browser extensions, we first showed that the extensions that users install and the websites they are logged into, can serve to uniquely identify and track them. We then studied the communications between browser extensions and web applications and demonstrate that malicious or poorly programmed extensions can be exploited by web applications to benefit from extensions privileged capabilities. Also, we demonstrated that extensions can disable the Same Origin Policy by tampering with CORS headers. All this enables web applications to read sensitive user information. To mitigate these threats, we proposed countermeasures and a more fine-grained permissions system and review process for browser extensions. We believe that this can help browser vendors identify malicious extensions and warn users about the threats posed by extensions they install
Grall, Hervé. "Deux critères de sécurité pour l'exécution de code mobile". Phd thesis, Ecole des Ponts ParisTech, 2003. http://tel.archives-ouvertes.fr/tel-00007549.
Texto completo da fonteBègue, Guillaume. "Confidentialité et prévention de la criminalité financière : étude de droit comparé". Thesis, Paris 1, 2016. http://www.theses.fr/2016PA01D019.
Texto completo da fonteThe recent trend towards transaprency in business highlights a more global disenchantment with the concept of secrecy. The concept of secrecy benefits from various legal expressions whose origins give it as undisputable legitimacy. This observation leads us to recognise the existence of a "Principle of confidentiality". The clash betxeen the rules of Financial Crime prevention and this principle of confidentiality is causing legal uncertainty not only for professional subject to Anti-money laundering and counter-terrorism financing regulations but also gor persons whose data is being processed. These two sets of conflicting rules nevertheless share a common goal, namely to ensure respect for fundamental rights. Notwithstanding this, both the risk of abuse of legal instruments offered by one set for illegitimate purposes and the shortcomings attached to the other set potentially hinder the efficient and reasonable use of Law. This study aims at analysing antagonistic principles to reach a certain balance by applying solutions which preserve their respective interests and contribute to legal certainty. In this regard, the comparative law analysis helps better interpret customer due diligence measures whilst rehabilitating the arguments in favour of the principle of confidentiality. This shows the development of e genuine AML/CFT Law and in particular its preventive aspects that form a major part of the Banking and Financial Regulations
Delannoy, Xavier. "Contributions à l'étude de la tension entre cohérence et confidentialité et du classement d'objets selon leur histoire dans les bases de données". Phd thesis, Université Joseph Fourier (Grenoble), 1997. http://tel.archives-ouvertes.fr/tel-00004936.
Texto completo da fonteBadra, Mohamad. "Le transport et la sécurisation des échanges sur les réseaux sans fil". Phd thesis, Télécom ParisTech, 2004. http://pastel.archives-ouvertes.fr/pastel-00000952.
Texto completo da fonteKauffmann-Tourkestansky, Xavier. "Analyses sécuritaires de code de carte à puce sous attaques physiques simulées". Phd thesis, Université d'Orléans, 2012. http://tel.archives-ouvertes.fr/tel-00771273.
Texto completo da fonteBarquissau, Eric. "L’évaluation de la qualité de la relation client en ligne par les utilisateurs d’espaces clients de sites web : une application dans le secteur bancaire et dans le secteur de la téléphonie mobile". Thesis, Paris 10, 2013. http://www.theses.fr/2013PA100205.
Texto completo da fonteThe Internet has dramatically changed the way companies interact with their customers. Because of the importance of e-customer relationship management, companies have to reconsider their strategies in terms of relationship marketing. The purpose of this research is to investigate the way users of personal websites’ accounts evaluate e-relationship quality within two sectors: the banking sector and the mobile phone sector. This research deals with an important concept: appropriation.A qualitative study has been conducted in order to build a research model and to create a measurement scale to study the appropriation of a personal websites’ account. Therefore, an online survey (N=534) was conducted to test the hypothesis. The findings suggest that the appropriation of a personal websites’ account is a mediating variable between perceived ease of use, perceived usability and relationship quality, both in the banking sector and in the mobile phone sector. In the same way, privacy has a positive influence on e-relationship quality. Moreover, perceived interactivity has a positive influence on e-relationship quality, but that particular hypothesis is partially validated. Finally, social presence does not have a positive influence on e-relationship quality
Capítulos de livros sobre o assunto "Sécurité et confidentialité"
SEMMOUD, Abderrazaq, e Badr BENMAMMAR. "La sécurité intelligente des réseaux informatiques". In Gestion et contrôle intelligents des réseaux, 5–28. ISTE Group, 2020. http://dx.doi.org/10.51926/iste.9008.ch1.
Texto completo da fonteZXIVANOVICH, Sava, Branislav TODOROVIC, Jean-Pierre LORRÉ, Darko TRIFUNOVIC, Adrian KOTELBA, Ramin SADRE e Axel LEGAY. "L’IdO pour une nouvelle ère de réseaux unifiés, de confiance zéro et de protection accrue de la vie privée". In Cybersécurité des maisons intelligentes, 185–213. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch5.
Texto completo da fonteATTRAPADUNG, Nuttapong, e Takahiro MATSUDA. "Chiffrement à clé publique et notions de sécurité". In Cryptographie asymétrique, 5–53. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9096.ch1.
Texto completo da fonteHAMDI, Omessaad, Mohamed AYMEN CHALOUF e Amal SAMMOUD. "Utilisation de la biométrie pour sécuriser les communications intra-BAN". In Gestion de la sécurité en e-santé, 137–59. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9179.ch6.
Texto completo da fonteBERGERON, Cyril, Wassim HAMIDOUCHE e Olivier DÉFORGES. "Crypto-compression de vidéos". In Sécurité multimédia 2, 145–89. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9027.ch5.
Texto completo da fonteITIER, Vincent, Pauline PUTEAUX e William PUECH. "Crypto-compression d’images". In Sécurité multimédia 2, 105–44. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9027.ch4.
Texto completo da fonteSCHMITT, Corinna, e Marvin WEBER. "Solution domotique pour SecureWSN". In Cybersécurité des maisons intelligentes, 1–79. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch1.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Sécurité et confidentialité"
Boulanger, J.-L., e L. Zhao. "Sécurité, confidentialité et intégrité dans les systèmes ferroviaires". In Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56197.
Texto completo da fonteRodríguez González, Sylvia Cristina. "Megadesarrollos turísticos de sol y playa enclaves del imaginario". In International Conference Virtual City and Territory. Barcelona: Centre de Política de Sòl i Valoracions, 2009. http://dx.doi.org/10.5821/ctv.7522.
Texto completo da fonteRelatórios de organizações sobre o assunto "Sécurité et confidentialité"
Dufour, Quentin, David Pontille e Didier Torny. Contracter à l’heure de la publication en accès ouvert. Une analyse systématique des accords transformants. Ministère de l'enseignement supérieur et de la recherche, abril de 2021. http://dx.doi.org/10.52949/2.
Texto completo da fonte