Literatura científica selecionada sobre o tema "Technologies de renforcement de la confidentialité"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Technologies de renforcement de la confidentialité".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Technologies de renforcement de la confidentialité"
Gusev, Alexander, Arnaud Leconte e Simone Lucatello. "Green Digital Transition and Data Governance". L'Europe en Formation 396, n.º 1 (13 de novembro de 2023): 59–83. http://dx.doi.org/10.3917/eufor.396.0059.
Texto completo da fonteMarsico, G. "Numérique, virtuel, réseaux sociaux, objets connectés : leviers ou freins à la confiance dans la relation de soins ?" Psycho-Oncologie 14, n.º 1-2 (março de 2020): 53–56. http://dx.doi.org/10.3166/pson-2020-0123.
Texto completo da fonteEgu, Hélène. "Système de brevets et développement dans un nouveau pays industriel". Économie appliquée 52, n.º 2 (1999): 121–54. http://dx.doi.org/10.3406/ecoap.1999.1692.
Texto completo da fonteMathieu, Réjean. "Signification et conséquences sociales des changements technologiques". Service social 36, n.º 1 (12 de abril de 2005): 119–28. http://dx.doi.org/10.7202/706344ar.
Texto completo da fonteGardy, Philippe. "L’apport des technologies multimédias en évaluation didactique de la traduction". Meta 60, n.º 3 (5 de abril de 2016): 406–30. http://dx.doi.org/10.7202/1036136ar.
Texto completo da fonteTranchant, Lucas. "Les ouvrier·ères du flux tendu : changements technologiques et néo-taylorisme dans les entrepôts". Regards croisés sur l'économie 34, n.º 1 (7 de outubro de 2024): 101–10. http://dx.doi.org/10.3917/rce.034.0101.
Texto completo da fonteKnoppers, Bartha Maria. "Vérité et information de la personne". Congrès de l’Association Henri Capitant : la vérité et le droit 18, n.º 4 (8 de abril de 2019): 819–42. http://dx.doi.org/10.7202/1058580ar.
Texto completo da fonteRopers, Philippe. "Vers une redéfinition des missions des travailleurs sociaux en lien avec les enjeux de cohésion sociale". Vie sociale 46, n.º 2 (24 de setembro de 2024): 153–60. http://dx.doi.org/10.3917/vsoc.046.0153.
Texto completo da fonteTschudi, Hunziker, Kündig, Lüscher, Freiermuth, Heller e Heberer. "Internet-Kommunikation zwischen Hausärzten und Universitätsspital". Praxis 91, n.º 7 (1 de fevereiro de 2002): 257–60. http://dx.doi.org/10.1024/0369-8394.91.7.257.
Texto completo da fonteBéranger, J., e P. Le Coz. "Réflexion éthique sur la pluridisciplinarité et la confidentialité de l’information en imagerie médicale via les nouvelles technologies de l’information et la communication". Cancer/Radiothérapie 16, n.º 3 (maio de 2012): 215–18. http://dx.doi.org/10.1016/j.canrad.2011.10.012.
Texto completo da fonteTeses / dissertações sobre o assunto "Technologies de renforcement de la confidentialité"
Taiello, Riccardo. "Apprentissage automatique sécurisé pour l'analyse collaborative des données de santé à grande échelle". Electronic Thesis or Diss., Université Côte d'Azur, 2024. http://www.theses.fr/2024COAZ4031.
Texto completo da fonteThis PhD thesis explores the integration of privacy preservation, medical imaging, and Federated Learning (FL) using advanced cryptographic methods. Within the context of medical image analysis, we develop a privacy-preserving image registration (PPIR) framework. This framework addresses the challenge of registering images confidentially, without revealing their contents. By extending classical registration paradigms, we incorporate cryptographic tools like secure multi-party computation and homomorphic encryption to perform these operations securely. These tools are vital as they prevent data leakage during processing. Given the challenges associated with the performance and scalability of cryptographic methods in high-dimensional data, we optimize our image registration operations using gradient approximations. Our focus extends to increasingly complex registration methods, such as rigid, affine, and non-linear approaches using cubic splines or diffeomorphisms, parameterized by time-varying velocity fields. We demonstrate how these sophisticated registration methods can integrate privacy-preserving mechanisms effectively across various tasks. Concurrently, the thesis addresses the challenge of stragglers in FL, emphasizing the role of Secure Aggregation (SA) in collaborative model training. We introduce "Eagle", a synchronous SA scheme designed to optimize participation by late-arriving devices, significantly enhancing computational and communication efficiencies. We also present "Owl", tailored for buffered asynchronous FL settings, consistently outperforming earlier solutions. Furthermore, in the realm of Buffered AsyncSA, we propose two novel approaches: "Buffalo" and "Buffalo+". "Buffalo" advances SA techniques for Buffered AsyncSA, while "Buffalo+" counters sophisticated attacks that traditional methods fail to detect, such as model replacement. This solution leverages the properties of incremental hash functions and explores the sparsity in the quantization of local gradients from client models. Both Buffalo and Buffalo+ are validated theoretically and experimentally, demonstrating their effectiveness in a new cross-device FL task for medical devices.Finally, this thesis has devoted particular attention to the translation of privacy-preserving tools in real-world applications, notably through the FL open-source framework Fed-BioMed. Contributions concern the introduction of one of the first practical SA implementations specifically designed for cross-silo FL among hospitals, showcasing several practical use cases
Langard, Stéphanie. "Approche juridique de la télémédecine : entre droit commun et règles spécifiques". Thesis, Université de Lorraine, 2012. http://www.theses.fr/2012LORR0206.
Texto completo da fonteTelemedicine allows use of information and telecommunication technologies in medical practice. Tried and tested in recent years by our health care system, it is considered as a modern means to current challenges: aging population, unequal access to health care delivery, medical desertification, etc. On health actors' request, the legislator has organized a legal framework for telemedicine by law n ° 2009-879 of 21 July 2009 reforming hospital system, and related to patients, to health care system and applicable in all territories, it is also embedded in the public health code. Telemedicine is governed by separate rules: those related to telemedicine's acts and those related to telemedicine's activity. Given the fact that telemedicine is based on medical procedures practiced through information and telecommunication technologies, it has to be regulated by ordinary laws rules on medical procedures as well as information and telecommunication technologies'rules. Thus, ordinary law rules and specific provisions currently coexist. Between ordinary law rules and specific provisions, does the telemedicine framework really fit with medical procedure?s requirements ?
Shen, Yufei. "Essais sur l'économie des systèmes d'information". Electronic Thesis or Diss., Jouy-en Josas, HEC, 2023. http://www.theses.fr/2023EHEC0010.
Texto completo da fonteThis dissertation aims to empirically study the business and societal consequences arising from the usage of emerging information technologies. The first chapter examines the unintended spillover effects of health information technology integration in combating the opioid crisis. I find that for a focal county, its neighboring state’s integrating Prescription Drug Monitoring Program (PDMP) into local Electronic Health Records leads to an increase in the focal county’s consumption of prescribed opioids, an undesirable spillover effect. Moreover, this undesirable spillover effect is mitigated when prescribers in the focal county have access to the neighboring state’s PDMP data via interstate PDMP data sharing. In the second chapter, I explore the effect of opting out of cookie tracking on consumer behavior on a news website. I find that consumers increase the quantity and diversity of their news consumption after disabling cookie tracking. This effect could be attributed to consumers' intrinsic value of enhanced privacy control. The results imply that protecting consumer privacy can add business value to firms
Ben, gamra Seima. "Valorisation économique de la propriété industrielle : cas de l'industrie pharmaceutique en tunisie". Thesis, Aix-Marseille 2, 2011. http://www.theses.fr/2011AIX24003.
Texto completo da fonteWe aim in this research to study how to assess the value of a patent in developed countries as well as in emerging ones, mainly according to the TRIPS.Modelization of the pharmaceutical industry in Tunisia has been possible when analyzing data evidence from pharmaceuticals patents in Tunisia.This research identify two strategies to capitalize on patents: « license in » ou « license out ».However, only few local industries in Tunisia are willing to file patents, even ifbiotechnologies dominate global pharmaceutical market.Being in touch with international scientific partners, signing contracts could help to valorize industrial property in Tunisia
Leukam, Lako Franklin. "Protection des données à caractère personnel pour les services énergétiques". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS004.
Texto completo da fonteSmart grids are important bricks in the fight against climate change. Smart grids allow the massive introduction of renewable energies, which are intermittent, while guaranteeing grid stability, i.e., ensuring a real-time balance between demand and production in the power grid. The management of grid stability is possible thanks to smart meters installed in households, allowing the distribution system operator to collect consumption/production data from consumers/producers at a time step of up to 10 min in France. This real-time consumption data enables to provide new energy services, such as customer consumption forecasts or demand response. Demand response services help to avoid consumption peaks in a neighborhood by ensuring that, at all times, users' consumption does not exceed the maximum power of the local grid. However, the collection of users' consumptions is a key privacy concern. Indeed, individual consumption data reflect the use of all electric appliances by inhabitants in a household over time, and enable to deduce the behaviors, activities, age or preferences of the inhabitants. This thesis aims to propose new energy services, while protecting the privacy of consumers. We propose five contributions that relate to two themes:1- The transformation of a demand response algorithm by making it privacy friendly. This transformation uses secure multiparty computation, allowing to compute an aggregate, such as a sum of users’ consumption, without disclosing any individual consumption.2- The publication of sum of users' consumption while preserving privacy and good utility. This publication uses differential privacy, ensuring that the publication of the sum does not indirectly reveal individual users' consumption. Among other energy services, these sums of consumption enable to perform consumption forecasts
Djemai, Ibrahim. "Joint offloading-scheduling policies for future generation wireless networks". Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS007.
Texto completo da fonteThe challenges posed by the increasing number of connected devices, high energy consumption, and environmental impact in today's and future wireless networks are gaining more attention. New technologies like Mobile Edge Computing (MEC) have emerged to bring cloud services closer to the devices and address their computation limitations. Enabling these devices and the network nodes with Energy Harvesting (EH) capabilities is also promising to allow for consuming energy from sustainable and environmentally friendly sources. In addition, Non-Orthogonal Multiple Access (NOMA) is a pivotal technique to achieve enhanced mobile broadband. Aided by the advancement of Artificial Intelligence, especially Reinforcement Learning (RL) models, the thesis work revolves around devising policies that jointly optimize scheduling and computational offloading for devices with EH capabilities, NOMA-enabled communications, and MEC access. Moreover, when the number of devices increases and so does the system complexity, NOMA clustering is performed and Federated Learning is used to produce RL policies in a distributed way. The thesis results validate the performance of the proposed RL-based policies, as well as the interest of using NOMA technique
Houle, Michaël. "Le potentiel des technologies de l’information et des communications pour le renforcement de la résilience organisationnelle lors des opérations d’évacuation : étude de cas de la ville de New York". Thèse, 2015. http://hdl.handle.net/1866/13110.
Texto completo da fonteDécarie, Jean-Sébastien. "Le cadre juridique applicable à une infrastructure sous forme de service (IaaS) dans le milieu universitaire". Thèse, 2019. http://hdl.handle.net/1866/22782.
Texto completo da fonteLivros sobre o assunto "Technologies de renforcement de la confidentialité"
Chilima, Saulos Klaus. Mémoires sur le développement publiés par la fondation pour le renforcement des capacités en Afrique: Le rôle des technologies de l'information et de la communication (TIC) dans le développement durable et inclusif de l'Afrique : comprendre les défis de capacités. Mt. Pleasant, Harare, Zimbabwe: Fondation pour le renforcement des capacités en Afrique, 2016.
Encontre o texto completo da fonteOntario. Esquisse de cours 12e année: Sciences de l'activité physique pse4u cours préuniversitaire. Vanier, Ont: CFORP, 2002.
Encontre o texto completo da fonteOntario. Esquisse de cours 12e année: Technologie de l'information en affaires btx4e cours préemploi. Vanier, Ont: CFORP, 2002.
Encontre o texto completo da fonteOntario. Esquisse de cours 12e année: Études informatiques ics4m cours préuniversitaire. Vanier, Ont: CFORP, 2002.
Encontre o texto completo da fonteOntario. Esquisse de cours 12e année: Mathématiques de la technologie au collège mct4c cours précollégial. Vanier, Ont: CFORP, 2002.
Encontre o texto completo da fonteOntario. Esquisse de cours 12e année: Sciences snc4m cours préuniversitaire. Vanier, Ont: CFORP, 2002.
Encontre o texto completo da fonteOntario. Esquisse de cours 12e année: English eae4e cours préemploi. Vanier, Ont: CFORP, 2002.
Encontre o texto completo da fonteOntario. Esquisse de cours 12e année: Le Canada et le monde: une analyse géographique cgw4u cours préuniversitaire. Vanier, Ont: CFORP, 2002.
Encontre o texto completo da fonteOntario. Esquisse de cours 12e année: Environnement et gestion des ressources cgr4e cours préemploi. Vanier, Ont: CFORP, 2002.
Encontre o texto completo da fonteOntario. Esquisse de cours 12e année: Histoire de l'Occident et du monde chy4c cours précollégial. Vanier, Ont: CFORP, 2002.
Encontre o texto completo da fonteRelatórios de organizações sobre o assunto "Technologies de renforcement de la confidentialité"
BACCELLI, François, Sébastien CANDEL, Guy PERRIN e Jean-Loup PUGET. Grandes Constellations de Satellites : Enjeux et Impacts. Académie des sciences, março de 2024. http://dx.doi.org/10.62686/2.
Texto completo da fonteMéthode d’évaluation de l’état de preparation. Un outil de la Recommandation sur l’éthique de l’intelligence artificielle. UNESCO, 2023. http://dx.doi.org/10.54678/ajgu4528.
Texto completo da fonte