Зміст
Добірка наукової літератури з теми "Contrôle d'accès basé sur le temps"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Contrôle d'accès basé sur le temps".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Contrôle d'accès basé sur le temps"
Thion, Romuald, and Stéphane Coulondre. "Intégration du contexte spatio-temporel dans le contrôle d'accès basé sur les rôles." Ingénierie des systèmes d'information 10, no. 4 (August 24, 2005): 89–117. http://dx.doi.org/10.3166/isi.10.4.89-117.
Повний текст джерелаSmith, Glenys A., Michelle M. Porter, Andrew W. Cull, Barbara L. Mazer, Anita M. Myers, Gary Naglie, Michel Bédard, et al. "Seasonal and Weather Effects on Older Drivers’ Trip Distances." Canadian Journal on Aging / La Revue canadienne du vieillissement 35, S1 (April 5, 2016): 59–68. http://dx.doi.org/10.1017/s0714980816000040.
Повний текст джерелаLeleu, Jean-Louis. "Enoncé musical et mode (s) de structuration de l'espace sonore, ou: de la relation composition/cognition dans un fragment de l'opus 28, I de Webern." Musicae Scientiae 2, no. 1 (March 1998): 3–18. http://dx.doi.org/10.1177/102986499800200101.
Повний текст джерелаSotomayor, O. A. Z., S. W. Park, and C. Garcia. "Modèle de référence pour évaluer différentes stratégies de contrôle dans des usines de traitement des eaux usées." Revue des sciences de l'eau 15, no. 2 (April 12, 2005): 543–56. http://dx.doi.org/10.7202/705468ar.
Повний текст джерелаPépin, L., Emmanuel Camus, Gérard Matheron, and Albert Bensaïd. "Utilisation de microsatellites comme marqueurs génomiques pour l’étude de la résistance à la cowdriose." Revue d’élevage et de médecine vétérinaire des pays tropicaux 46, no. 1-2 (January 1, 1993): 209. http://dx.doi.org/10.19182/remvt.9364.
Повний текст джерелаToussaint, J., T. Habtemariam, D. Oryang, and S. Wilson. "Développement d’un modèle de simulation informatique pour l’anaplasmose, notamment dans les Antilles." Revue d’élevage et de médecine vétérinaire des pays tropicaux 46, no. 1-2 (January 1, 1993): 47–48. http://dx.doi.org/10.19182/remvt.9396.
Повний текст джерелаLeppänen, Anneli. "Improving the Mastery of Work and the Development of the Work Process in Paper Production." Relations industrielles 56, no. 3 (October 22, 2002): 579–609. http://dx.doi.org/10.7202/000083ar.
Повний текст джерелаVignoles, Philippe, Philippe Hourdin, Gilles Dreyfuss, and Daniel Rondelaud. "Epidémiologie de la fasciolose dans le Limousin : bilan des recherches effectuées depuis les années 1970." Annales Scientifiques du Limousin, no. 28 (June 11, 2019). http://dx.doi.org/10.25965/asl.1030.
Повний текст джерелаPetitjean, Mikael. "Numéro 98 - septembre 2012." Regards économiques, October 12, 2018. http://dx.doi.org/10.14428/regardseco.v1i0.14853.
Повний текст джерелаPetitjean, Mikael. "Numéro 98 - septembre 2012." Regards économiques, October 12, 2018. http://dx.doi.org/10.14428/regardseco2012.09.01.
Повний текст джерелаДисертації з теми "Contrôle d'accès basé sur le temps"
Ghadi, Abderrahim. "Modèle hiérarchique de contrôle d'accès d'UNIX basé sur un graphe de rôles." Strasbourg, 2010. http://www.theses.fr/2010STRA6005.
Повний текст джерелаConcerning access control, can the following question be addressed : "Is the access control system decidable ?". In other words : is it true that starting from a safe state of protection, we can assume at any time that is no intrusion which will endanger our system ?. In order to answer this question, we propose to model the access control system in the form of a graph of roles. The roles, which represent the vertices of graph contain, according to the security-policy, certain number of privileges. Every privilege represents one or several access rights on a given object. We presented two methods of use of this graph : The first consists in using an algorithm, which we developed by basing itself on the algorithms of the theory of the graphs, permit to search all over the path of the graph in order to find illicit privilege transfer. The second consists in storing our graph in a directory LDAP, this which brings us to develop a new plan LDAP to represent our graph of roles
Jemel, Mayssa. "Stockage des données locales : sécurité et disponibilité." Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0053.
Повний текст джерелаDue to technological advancements, people are constantly manipulating multiple connected and smart devices in their daily lives. Cross-device data management, therefore, remains the concern of several academic and industrial studies. The proposed frameworks are mainly based on proprietary solutions called private or closed solutions. This strategy has shown its deficiency on security issues, cost, developer support and customization. In recent years, however, the Web has faced a revolution in developing standardized solutions triggered by the significant improvements of HTML5. With this new version, innovative features and APIs are introduced to follow business and user requirements. The main purpose is to provide the web developer with a vendor-neutral language that enables the implementation of competing application with lower cost. These applications are related neither to the used devices nor to the installed software. The main motivation of this PhD thesis is to migrate towards the adoption of standardized solutions to ensure secure and reliable cross-device data management in both the client and server side. There is already a proposed standardized Cloud Digital Safe on the server side storage that follows the AFNOR specification while there is no standardized solution yet on the client-side. This thesis is focused on two main areas : 1) the proposal of a standardized Client Digital Safe where user data are stored locally and 2) the synchronization of these data between the Client and the Cloud Digital Safe and between the different user devices. We contribute in this research area in three ways. First, we propose a Client Digital Safe based on HTML5 Local Storage APIs. We start by strengthening the security of these APIs to be used by our Client Digital Safe. Second, we propose an efficient synchronization protocol called SyncDS with minimum resource consumption that ensures the synchronization of user data between the Client and the Cloud Digital Safe. Finally, we address security concerns, in particular, the access control on data sharing following the Digital Safe requirements
Komarova, Maryna. "Authentification rapide et contrôle d'accès basé sur la confiance dans les réseaux sans fil hétérogène." Phd thesis, Télécom ParisTech, 2008. http://pastel.archives-ouvertes.fr/pastel-00003793.
Повний текст джерелаKomarova, Maryna. "Authentification rapide et contrôle d'accès basé sur la confiance dans les réseaux sans fil hétérogènes." Paris, ENST, 2008. http://pastel.archives-ouvertes.fr/pastel-00003793/fr/.
Повний текст джерелаIn this thesis, we study the current situation and trends in wireless technologies development. We discuss the problems related to security mechanisms specific to each technology, and in particular the possibilities for integration and interworking. We first study the possibility of authentication latency decreasing in a scenario where the network access authentication is decoupled from the service access authentication. An authorized user is granted network and service access as a result of a single authentication process that combines 802. 1X and PANA operations. Then we introduce the Fast re-Authentication Protocol (FAP) for inter-domain roaming, which aims to reduce the authentication delay for a mobile user in a visited administrative domain. The approach eliminates the need for communication between the target and the user's home networks for credentials verification. We develop the Fast re-Authentication Protocol by suggesting a ticket distribution scheme for inter-domain roaming. This method decreases the number of tickets sent and consequently the overhead and delay of the ticket acquisition phase of the protocol. Numerical results obtained from experiments on a test-bed and a series of simulations show that the proposed scheme enhances inter-domain handover parameters such as authentication latency and signalling cost. To improve the access control to network resources we propose the adjustable trust model. The purpose of this work is to provide the network with the opportunity to react to user behaviour. Users are motivated to gain higher trust because trusted users have access to a larger set of services with higher quality of service. Validation of the proposed trust-based access control method has been done via simulations. Finally, we discuss how the proposed solutions can be implemented in a single framework
Samhat, Abed Ellatif. "La qualité de service dans le réseau d'accès radio terrestre umts basé sur IP." Paris 6, 2004. http://www.theses.fr/2004PA066398.
Повний текст джерелаEl, Baida Rania. "Gestion des incohérences dans les systèmes de contrôle d'accès." Artois, 2004. http://www.theses.fr/2004ARTO0401.
Повний текст джерелаModelling information security policies is being an important task in many domains. We proposed a new access control system called OrBAC (Organization based access control). This system brings many solutions to the existing access control systems. For instance, OrBAC takes into account the context and is able to represent various kinds of privileges : permission, prohibition and obligation. However, this system does not deal with conflicts due to the joint handling of permission or obligation and prohibition policies. We dealt with the problem of handling conflicts in the OrBAC system, modelled by first order logic knowledge bases. We showed that approaches suggested for handling conflicts in propositionnal knowledge bases are not adapted for inconsistent first order knowledge bases. We proposed an approach in which we weak first order formulas responsible of conflicts
Tik, Sovanna. "Contrôle d'un système intégré d'assainissement urbain basé sur la qualité de l'eau vers des stratégies tolérantes aux fautes." Doctoral thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/40351.
Повний текст джерелаRegulation concerning urban wastewater management is evolving towards a holistic approach which leads stakeholders to increasingly consider the integrated urban wastewater system(IUWS), including the sewer system and the water resource recovery facility (WRRF), as a whole. This change of paradigm opens doors to new collaborations between the traditionally separated fields of urban drainage and wastewater treatment operation and research. In this context of innovation and integration, modelling is going to be a key tool, granting a better understanding of the complexity of interactions between the different parts of the IUWS. At the same time, the IUWS has to become more resilient to face the impacts of climate change, the long-term effects of which are difficult to quantify. Still, climate change experts agree on the increasing probability of occurrence of high intensity rain events, reaching the limits of current wastewater infrastructure operational capacities. In order for these infrastructures to continue to provide adequate performance with respect to current norms and regulations, while limiting costs and budgetary needs, flexible solutions, such as implementing real-time control (RTC) systems, should be considered. Especially since recent technological developments bring new and more reliable tools to measure water quality, and also to analyse and manage large quantities of data.This study focuses on the behaviour of the particulate pollution in the IUWS, an important water quality indicator, commonly measured as the total suspended solids (TSS) concentrationand highly correlated with turbidity measurement. As turbidity sensors are readilyavailable with increasing reliability, their operational use can be envisioned. The objective of this thesis is to develop and assess water quality-based control strategies for the IUWS. An integrated - sewer and WRRF - model, using the particle settling velocity distribution (PSVD) approach, has been proposed. This approach improves the description of particle settling and resuspension in the whole system, allowing a better forecast of TSS concentration dynamics, especially during rain events. Based on this integrated model, innovative water quality-based control strategies, aiming at reducing overall discharge of particulate pollutants (and the heavy metals, pathogens, etc. that come with it) to the receiving water during wet weather, have been proposed and successfully tested. Experimental studies demonstrated that turbidity sensors installed in the IUWS are subject to harsh conditions, leading to faulty sensor signals. The performance loss due to the use of water quality-based control strategies affected by a faulty turbidity signal has been evaluatedin detail and this has demonstrated the need for fault detection tools. When a faulty signal is detected, alarms will allow operators to decide which operating mode should be used instead of the one using the now faulty sensor. Alternatively, automatic responses and changes could be implemented to counteract the effects of a faulty signal. This last option, called downgraded operating mode, which implies reverting to a control strategy that does not use the faulty signal, has been simulated and tested. If the fault is detected within reasonable time (which depends on the system dynamics), these simulations have shown that part of the increase of performance gained with the water quality-based strategy using the good signal, can be maintained. The results of this study thus present a strong case for optimizing wastewater infrastructure operations, especially when they are considered as an integrated system, instead of autonomous and mutually exclusive systems. Furthermore, the developed integrated model may be use as a decision support tool to help determine the best possible (integrated) controlstrategy. Keywords : chemically enhanced primary treatment (CEPT); integrated modelling; integratedurban wastewater system (IUWS); real-time control (RTC); stormwater management.
Attemene, N'guessan Stéphane. "Optimisation temps réel des flux énergétiques au sein d'un système multi-sources multi-charges basé sur les énergies d'origine renouvelable." Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCD044.
Повний текст джерелаThis work is focused on the real-time optimal control of a stand-alone system consisting of a photovoltaic generator, a PEM fuel cell, an alkaline electrolyzer, a battery and supercapacitor pack for a stationary application. The coupling of these different sources aims to improve performance, the availability of the resulting electrical grid, the supply of electricity over much longer periods, and especially the satisfaction of the load by using each source in a controlled way.First, a thorough study of the feasibility of the system from a technical, energetic, economic and environmental point of view is carried out. As a result, an optimal sizing method is proposed. A sensitivity analysis to evaluate the influence of subsystems cost and the size respectively on the overall energy cost and the equivalent CO2 emitted by the system is also discussed. Then, a model enabling easy scaling of components to achieve the capacity required for the system is developped. The global model of the system is obtained by exploiting the modularity of the formalism used for modeling (the Energetic Macroscopic Representation). Finally, an energy management method based on Energy consumption Minimization Strategy (ECMS) is proposed. A comparative study of the results obtained by the ECMS and those obtained by dynamic programming has enabled the validation of the optimal control strategy developed
Mihaita, Adriana. "Approche probabiliste pour la commande orientée évènement des systèmes stochastiques à commutation." Thesis, Grenoble, 2012. http://www.theses.fr/2012GRENT036/document.
Повний текст джерелаHybrid systems are dynamical systems, characterized by a dual behaviour, a continuousinteraction between a discrete and a continuous functioning part. The center ofour work is represented by a particular class of hybrid systems, more specific by thestochastic switching systems which we model using continuous time Markov chains anddifferential equations.The random behaviour of such systems requires a special command which adapts tothe arbitrary events that can completely change the evolution of the system. We chose anevent-based control policy which is triggered only when it’s necessary (on an unforeseenevent - for example when a threshold that is reached), and until certain functioningconditions are met (the system returns in the normal state).Our approach aims to develop a probabilistic model that calculates a performancecriterion (in this case the energy of the system) for the proposed control policy. We startby proposing a discrete event simulation for the controlled stochastic switching system,which gives us the opportunity of applying a direct optimisation of the control command.It also allows us to compare the results with the ones obtained by the analytical modelswe have built when the event-based control is applied.An analytical model for computing the energy consumed by the system to apply thecontrol is designed by using the exit probabilities of the control region, respectively, thesojourn times of the Markov chain before and after reaching the control limits. The lastpart of this work presents the results we have obtained when comparing the analyticaland the simulation method
Cheaito, Marwan. "Un cadre de spécification et de déploi[e]ment de politiques d'autorisation." Toulouse 3, 2012. http://thesesups.ups-tlse.fr/1617/.
Повний текст джерелаOur work proposes a methodology for the conception and the development of an adaptable authorization system that can cover the requirements of access control in organizations such as the heterogeneity of organizational practices, the technologies used and the contexts to consider. To answer, two approaches of management have guided our study: the attribute based access control and the policy based management. * The attribute based access control permits to specify permissions related to any security characteristics of users, actions, resources and environment. This approach addresses the problems related to the expressivity of languages of authorization policies. * The policy based management, for its part, aims to enable the dynamic adaptability behavior of the system through the management of policies. Roughly, the architecture supporting this approach consists of two main entities: a policy decision point (PDP), and a policy enforcement point (PEP). The PDP is independent of the managed element, which interprets the policy and takes management decisions based on it. The PEP is the interface between the PDP and the managed element. It compels the managed system to execute the management decisions taken by the PDP. This architecture supports the integration of the management system in a managed environment. Therefore, we have chosen the standard XACML as a target technology because it supports both approaches. If in a theoretical point of view, XACML seems to address the issues of adaptability. However, systems designed according to this standard are limited to a given situation. In fact, a developed XACML system that satisfies the given requirements and a particular technological environment cannot be easily reused in another context. Therefore, it is necessary to define a methodology in order to render such authorization system adaptable in practice. Our approach is to define a minimal authorization system (i. E. A core that only supports the standard XACML) that can be easily extended for specific requirements in a given situation (ex. , the ability to express and implement policies including complex constraints, adaptation to a particular technological environment, etc. ). This raises the following questions: * What extensions that should be imported to the minimal authorization system? Is it possible to reuse the extensions for different situations? For example, the number of technologies used to store the user credentials is limited (ex. , LDAP, MySQL, Active Directory). However, the user credentials and the structuring of the data of user credentials may differ from one organization to another. * How to manage the lifecycle of the extensions in the authorization system ? In fact, there is a strong link between the use of an extension and the requirements expressed in an authorization policy. For example, the existence in the authorization system of an extension to retrieve the role of the user in a MySQL database is required only if the authorization system must evaluate at least one policy that includes constraints on the role of users. Otherwise, this extension does not happen to be present in the minimal authorization system. Similarly, if a policy including constraints on user roles is loaded into the authorization system, the associated extension must be added also. Based on the various studies from the field of software engineering related to the concept of adaptability, we have identified the requirements of adaptation of authorization systems. This work allows us to determine a classification of extensions according to the requirements of adaptability in authorization systems of type XACML. We have also proposed a methodology to facilitate the creation of extensions and promoting their reusability in the authorization system. Finally, we have addressed the problem of managing the lifecycle of the extensions in the authorization system by proposing the concept of "self-contained policy". A self-contained policy includes the authorization rules and any necessary information in order the authorization system interprets and runs it (i. E. , the extensions and their configurations). Also, we have described the architecture for specifying and deploying self-contained policies using the approach components-oriented services. Our architecture is flexible and dynamically adaptable. We have implemented it using the OSGi framework in order to validate our work in both terms of feasibility, and performance. In addition, we have conducted a self-contained policy editor that facilitates the writing of authorization rules and the configuration of the used extensions