Добірка наукової літератури з теми "Attribut Privé"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Attribut Privé".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Attribut Privé":
Thériault, J. Yvon. "De l’utilité de la distinction moderne privé/public." Politique, no. 21 (December 12, 2008): 37–69. http://dx.doi.org/10.7202/040712ar.
Chikoc Barreda, Naivi. "Le choix de la loi applicable à la succession limité par les mesures de protection familiale en droit international privé québécois." Les Cahiers de droit 59, no. 4 (January 9, 2019): 831–55. http://dx.doi.org/10.7202/1055257ar.
Braën, André. "De l’effet relatif du contrat maritime ou de la relative uniformité du droit maritime canadien." Revue générale de droit 31, no. 3 (December 18, 2014): 473–513. http://dx.doi.org/10.7202/1027845ar.
Esterle-Hedibel, Maryse. "Choix d’un métier et rêves adolescents : l’exemple des lycées professionnels [Diversité n°154 – septembre 2008]." Diversité 14, no. 1 (2012): 226–32. http://dx.doi.org/10.3406/diver.2012.7991.
Esterle-Hedibel, Maryse. "Choix d'un métier et rêves adolescents : l'exemple des lycées professionnels." Diversité 154, no. 1 (2008): 121–27. http://dx.doi.org/10.3406/diver.2008.2962.
Lamatsch, Harald. "Transformation numérique de l’administration : la recherche d’efficacité et d’agilité." Revue Défense Nationale N° Hors-série, HS13 (September 20, 2023): 77–90. http://dx.doi.org/10.3917/rdna.hs13.0077.
Tillier, Mathieu. "Une tradition coranique égyptienne ? Le codex de ʿUqba b. ʿĀmir al-Ǧuhanī". Studia Islamica 117, № 1 (13 квітня 2022): 38–63. http://dx.doi.org/10.1163/19585705-12341456.
Mockle, Daniel. "Ordre normatif interne et organisations." Les Cahiers de droit 33, no. 4 (April 12, 2005): 965–1056. http://dx.doi.org/10.7202/043174ar.
Jolicoeur, Louise. "Les groupes d’amis des bibliothèques publiques aux États-Unis et au Canada." Documentation et bibliothèques 44, no. 3 (September 14, 2015): 121–28. http://dx.doi.org/10.7202/1032948ar.
Van Schagen, Esther. "The Hidden Potential of Regulatory Impact Assessments (RIAs) in the Private Law Acquis." European Review of Private Law 22, Issue 1 (February 1, 2014): 69–87. http://dx.doi.org/10.54648/erpl2014004.
Дисертації з теми "Attribut Privé":
Alipour, Pijani Bizhan. "Attaques par inférence d'attributs sur les publications des réseaux sociaux." Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0009.
Online Social Networks (OSN) are full of personal information such as gender, age, relationship status. The popularity and growth of OSN have rendered their platforms vulnerable to malicious activities and increased user privacy concerns. The privacy settings available in OSN do not prevent users from attribute inference attacks where an attacker seeks to illegitimately obtain their personal attributes (such as the gender attribute) from publicly available information. Disclosure of personal information can have serious outcomes such as personal spam, bullying, profile cloning for malicious activities, or sexual harassment. Existing inference techniques are either based on the target user behavior analysis through their liked pages and group memberships or based on the target user friend list. However, in real cases, the amount of available information to an attacker is small since users have realized the vulnerability of standard attribute inference attacks and concealed their generated information. To increase awareness of OSN users about threats to their privacy, in this thesis, we introduce a new class of attribute inference attacks against OSN users. We show the feasibility of these attacks from a very limited amount of data. They are applicable even when users hide all their profile information and their own comments. Our proposed methodology is to analyze Facebook picture metadata, namely (i) alt-text generated by Facebook to describe picture contents, and (ii) commenters’ words and emojis preferences while commenting underneath the picture, to infer sensitive attributes of the picture owner. We show how to launch these inference attacks on any Facebook user by i) handling online newly discovered vocabulary using a retrofitting process to enrich a core vocabulary that was built during offline training and ii) computing several embeddings for textual units (e.g., word, emoji), each one depending on a specific attribute value. Finally, we introduce ProPic, a protection mechanism that selects comments to be hidden in a computationally efficient way while minimizing utility loss according to a semantic measure. The proposed mechanism can help end-users to check their vulnerability to inference attacks and suggests comments to be hidden in order to mitigate the attacks. We have determined the success of the attacks and the protection mechanism by experiments on real data
Abid, Younes. "Analyse automatisée des risques sur la vie privée dans les réseaux sociaux." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0088/document.
In this thesis we shed the light on the danger of privacy leakage on social network. We investigate privacy breaches, design attacks, show their feasibility and study their accuracies. This approach helps us to track the origin of threats and is a first step toward designing effective countermeasures. We have first introduced a subject sensitivity measure through a questionnaire survey. Then, we have designed on-line friendship and group membership link disclosure (with certainty) attacks on the largest social network “Facebook”. These attacks successfully uncover the local network of a target using only legitimate queries. We have also designed sampling techniques to rapidly collect useful data around a target. The collected data are represented by social-attribute networks and used to perform attribute inference (with uncertainty) attacks. To increase the accuracy of attacks, we have designed cleansing algorithms. These algorithms quantify the correlation between subjects, select the most relevant ones and combat data sparsity. Finally, we have used a shallow neural network to classify the data and infer the secret values of a sensitive attribute of a given target with high accuracy measured by AUC on real datasets. The proposed algorithms in this work are included in a system called SONSAI that can help end users analyzing their local network to take the hand over their privacy
Abid, Younes. "Analyse automatisée des risques sur la vie privée dans les réseaux sociaux." Electronic Thesis or Diss., Université de Lorraine, 2018. http://www.theses.fr/2018LORR0088.
In this thesis we shed the light on the danger of privacy leakage on social network. We investigate privacy breaches, design attacks, show their feasibility and study their accuracies. This approach helps us to track the origin of threats and is a first step toward designing effective countermeasures. We have first introduced a subject sensitivity measure through a questionnaire survey. Then, we have designed on-line friendship and group membership link disclosure (with certainty) attacks on the largest social network “Facebook”. These attacks successfully uncover the local network of a target using only legitimate queries. We have also designed sampling techniques to rapidly collect useful data around a target. The collected data are represented by social-attribute networks and used to perform attribute inference (with uncertainty) attacks. To increase the accuracy of attacks, we have designed cleansing algorithms. These algorithms quantify the correlation between subjects, select the most relevant ones and combat data sparsity. Finally, we have used a shallow neural network to classify the data and infer the secret values of a sensitive attribute of a given target with high accuracy measured by AUC on real datasets. The proposed algorithms in this work are included in a system called SONSAI that can help end users analyzing their local network to take the hand over their privacy
Kurien, Anish Mathew. "Approches pour la classification du trafic et l’optimisation des ressources radio dans les réseaux cellulaires : application à l’Afrique du Sud." Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1090/document.
The growth in the number of cellular mobile subscribers worldwide has far outpaced expected rates of growth with worldwide mobile subscriptions reaching 6 Billion subscribers in 2011 according to the International Telecommunication Union (ITU). More than 75% of this figure is in developing countries. With this rate of growth, greater pressure is placed on radio resources in mobile networks which impacts on the quality and grade of service (GOS) in the network. With varying demands that are generated from different subscriber classes in a network, the ability to distinguish between subscriber types in a network is vital to optimise infrastructure and resources in a mobile network. In this study, a new approach for subscriber classification in mobile cellular networks is proposed. In the proposed approach, traffic data extracted from two network providers in South Africa is considered. The traffic data is first decomposed using traditional feature extraction approaches such as the Empirical Mode Decomposition (EMD) and the Discrete Wavelet Packet Transform (DWPT) approach. The results are then compared with the Difference Histogram approach which considers the number of segments of increase in the time series. Based on the features extracted, classification is then achieved by making use of a Fuzzy C-means algorithm. It is shown from the results obtained that a clear separation between subscriber classes based on inputted traffic signals is possible through the proposed approach. Further, based on the subscriber classes extracted, a novel two-level hybrid channel allocation approach is proposed that makes use of a Mixed Integer Linear Programming (MILP) model to consider the optimisation of radio resources in a mobile network. In the proposed model, two levels of channel allocation are considered: the first considers defining a fixed threshold of channels allocated to each cell in the network. The second level considers a dynamic channel allocation model to account for the variations in traffic experienced in each traffic class identified. Using the optimisation solver, CPLEX, it is shown that an optimal solution can be achieved with the proposed two-level hybrid allocation model
Imine, Youcef. "Cloud computing security." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.
These last years, we are witnessing a real digital revolution of Internet where many innovative applications such as Internet of Things, autonomous cars, etc., have emerged. Consequently, adopting externalization technologies such as cloud and fog computing to handle this technological expansion seems to be an inevitable outcome. However, using the cloud or fog computing as a data repository opens many challenges in prospect. This thesis addresses security issues in cloud and fog computing which is a major challenge that need to be appropriately overcomed. Indeed, adopting these technologies means that the users lose control over their own data, which exposes it to several security threats. Therefore, we first investigated the main security issues facing the adoption of cloud and fog computing technologies. As one of the main challenges pointed in our investigation, access control is indeed a cornerstone of data security. An efficient access control mechanism must provide enforced and flexible access policies that ensure data protection, even from the service provider. Hence, we proposed a novel secure and efficient attribute based access control scheme for cloud data-storage applications. Our solution ensures flexible and fine-grained access control and prevents security degradations. Moreover, it performs immediate users and attributes revocation without any key regeneration. Authentication service in fog computing architecture is another issue that we have addressed in this thesis. Some traditional authentication schemes endure latency issues while others do not satisfy fog computing requirements such as mutual authentication between end-devices and fog servers. Thus, we have proposed a new, secure and efficient authentication scheme that ensures mutual authentication at the edge of the network and remedies to fog servers' misbehaviors.Finally, we tackled accountability and privacy-preserving challenges in information-sharing applications for which several proposals in the literature have treated privacy issues, but few of them have considered accountability service. Therefore, we have proposed a novel accountable privacy preserving solution for public information sharing in data externalization platforms. Externalization servers in our scheme authenticate any user in the system without violating its privacy. In case of misbehavior, our solution allows to trace malicious users thanks to an authority
Частини книг з теми "Attribut Privé":
Kesselring, K. J., and Tim Stretton. "Secular Separations." In Marriage, Separation, and Divorce in England, 1500-1700, 33–50. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780192849953.003.0002.
Slack, Paul. "Towns under stress." In The Impact of plague in Tudor and Stuart England, 256–83. Oxford University PressOxford, 1990. http://dx.doi.org/10.1093/oso/9780198202134.003.0010.
"Lady Mary Cheke, Née Hill, Later Macwilliam (c.1527-1616)." In Early Modern Women Poets (1520-1700), edited by Jane Stevenson Peter Davidson, Meg Bateman, Kate Chedgzoy, and Julie Saunders, 21. Oxford University PressOxford, 2001. http://dx.doi.org/10.1093/oso/9780198184263.003.0012.
Тези доповідей конференцій з теми "Attribut Privé":
Ukil, Arijit, Leandro Marin, and Antonio J. Jara. "Priv-Aug-Shap-ECGResNet: Privacy Preserving Shapley-Value Attributed Augmented Resnet for Practical Single-Lead Electrocardiogram Classification." In ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2023. http://dx.doi.org/10.1109/icassp49357.2023.10096437.
Sportello, Valentina. "Cronaca di un abbandono: fenomeni di migrazione all'interno della Ciudad Vieja di Montevideo." In International Conference Virtual City and Territory. Roma: Centre de Política de Sòl i Valoracions, 2014. http://dx.doi.org/10.5821/ctv.8015.