Добірка наукової літератури з теми "Modèles de gestion de la confiance"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Modèles de gestion de la confiance".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Modèles de gestion de la confiance"
Tanguy, François. "La gestion des ressources humaines à la DGFiP, d’une gestion administrative à une approche personnalisée et prospective." Gestion & Finances Publiques, no. 5 (September 2021): 74–82. http://dx.doi.org/10.3166/gfp.2021.5.012.
Повний текст джерелаMbassi, Jean-Claude, and Richard Nkene Ndeme. "La mobilisation du « health belief model modifié » en communication publique peut-elle contribuer au changement de comportement en période de COVID-19 ?" Communication & management Vol. 20, no. 2 (February 14, 2024): 63–80. http://dx.doi.org/10.3917/comma.202.0063.
Повний текст джерелаKorahiré, Joël Awouhidia. "Dynamiques socioéconomiques dans les villages riverains au ranch de gibier de Nazinga au Burkina Faso." Articles 40, no. 2 (March 24, 2011): 53–70. http://dx.doi.org/10.7202/1001388ar.
Повний текст джерелаZahar, Y., and J. P. Laborde. "Une méthode stochastique pour la prédétermination des fluctuations probables des durées de service des réservoirs collinaires en Tunisie." Revue des sciences de l'eau 11, no. 1 (April 12, 2005): 25–42. http://dx.doi.org/10.7202/705295ar.
Повний текст джерелаChênevert, Denis, Geneviève Jourdain, and Marie-Claude Tremblay. "Les comportements de citoyenneté du personnel soignant : lorsque le sens et la confiance deviennent incontournables." Articles 68, no. 2 (June 11, 2013): 210–38. http://dx.doi.org/10.7202/1016317ar.
Повний текст джерелаFolton, Nathalie, and Patrick Arnaud. "Indicateurs sur la ressource en eau estimés par une modélisation pluie-débit régionalisée : la base de données Web LoiEau." La Houille Blanche, no. 3 (June 2020): 22–29. http://dx.doi.org/10.1051/lhb/2020034.
Повний текст джерелаBeaumont, Julie, and Carole Lavallée. "L’enseignant ressource : un prof qui parle aux profs." Développement Humain, Handicap et Changement Social 20, no. 1 (February 28, 2022): 21–29. http://dx.doi.org/10.7202/1086765ar.
Повний текст джерелаSritharan, Jeavana, Jill S. MacLeod, Christopher B. McLeod, Alice Peter, and Paul A. Demers. "Risque de cancer de la prostate par profession dans le Système de surveillance des maladies professionnelles de l’Ontario, Canada." Promotion de la santé et prévention des maladies chroniques au Canada 39, no. 5 (May 2019): 195–205. http://dx.doi.org/10.24095/hpcdp.39.5.02f.
Повний текст джерелаCusack, Sandra, and Wendy Thompson. "Building a Community of Leaders: Research and Development of A Program to Train Seniors as Empowering Leaders." Canadian Journal for the Study of Adult Education 10, no. 2 (November 1, 1996): 19–36. http://dx.doi.org/10.56105/cjsae.v10i2.2071.
Повний текст джерелаMassoni, Sébastien. "Confiance, métacognition et perception." Articles 92, no. 1-2 (May 11, 2017): 459–85. http://dx.doi.org/10.7202/1039885ar.
Повний текст джерелаДисертації з теми "Modèles de gestion de la confiance"
Abidi, Rihab. "Smart Rοad Signs based trust management mοdels fοr cοοperative Ιntellgent Τranspοrtatiοn Systems". Electronic Thesis or Diss., Normandie, 2024. http://www.theses.fr/2024NORMR111.
Повний текст джерелаThe increasing complexity of urban traffic systems has made congestion a significant challenge, leading to severe economic, environmental, and social impacts. Intelligent Transportation Systems (ITSs) have emerged as a promising solution to mitigate these challenges by enabling dynamic traffic management. However, the reliability of data within ITSs represents an increasingly significant challenge. The introduction of erroneous data by defective or malicious sensors can lead to malfunctions or intentional disruptions of the system. In this context, trust management models assume a crucial importance.Most of the existing trust models propose vehicle-centric approaches. However, the high mobility and dynamic nature of the ITS environments affects the stability and scalabity of such systems. Accordingly, proposing novel trust models designed specifically for ITSs to enhance the accuracy, security, scalability and stabilty of traffic information dissemination constitutes the overall goal of this thesis.First, we proposed a generic architecture for a trust framework, leveraging Smart Road Signs (SRSs). The conception of this architecture was built upon the output of a deep investigation of the state of the art. This framework has been, then, developed to propose two novel trust models. The first model, considers the contextual information and multi-source data aggregation to assess the trustworthiness of reported traffic events and the different nodes of the network. Additionally, the model applies a bi-level trust evaluation combining Bayesian Inference and a dynamic weighted sum approach. Furthermore, a predictive-based Baysian Inference was proposed to enhance the accuracy of trust evaluation. Thereafter, a communication trust model was proposed, to complement the previous contribution, using Quality of Service (QoS) metrics to evaluate the SRSs behaviour. This model introduces a self-organizing trust model to track the SRSs' behaviours and establishes stable environments using a fuzzy-based Dempster Shafer Theory (DST). In fact, we consider a more realistic scenario where all the nodes are vulnerable to attacks and failure. Thus, the main objective of this model is to ensure that the system remains operational even in hostile environments, by mitigating the inherent single point of failure vulnerability characteristic of centralized network architectures.\\The proposed models were validated through simulations, showing their effectiveness in identifying malicious nodes and mitigating erroneous traffic reports. The results demonstrate that considering multi-source data aggregation and context-aware information increases the accuracy of trust evaluation. Furthermore, the adoption of an infrastructure-based framework leveraging a decentralized and hierarchical architecture enhances the scalability and stability of the trust models, which is suitable for such environment
Fragoso, Rodriguez Uciel. "Modèle de respect de la vie privée dans une architecture d'identité fédérée." Phd thesis, Institut National des Télécommunications, 2009. http://tel.archives-ouvertes.fr/tel-00541850.
Повний текст джерелаBradai, Amira. "Secured trust and reputation system : analysis of malicious behaviors and optimization." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0019/document.
Повний текст джерелаReputation mechanisms offer a novel and effective way of ensuring the necessary level of trust which is essential to the functioning of any critical system. They collect information about the history (i.e., past transactions) of participants and make public their reputation. Prospective participants guide their decisions by considering reputation information, and thus make more informative choices. Online reputation mechanisms enjoy huge success. They are present in most e-commerce sites available today, and are seriously taken into consideration by human users. Existing reputation systems were conceived with the assumption that users will share feedback honestly. But, such systems like those in peer to peer are generally compromise of malicious users. This leads to the problem in cooperation, aggregation and evaluation. Some users want to use resources from network but do not want to contribute back to the network. Others manipulate the evaluations of trust and provide wrong estimation. We have recently seen increasing evidence that some users strategically manipulate their reports and behave maliciously. For proper protecting against those users, some kind of reputation management system is required. In some system, a trusted third entity exists and can aggregate the information. However, Peer-to-peer networks don’t have any central control or repository. Large size of distributed and hybrid networks makes the reputation management more challenging task. Hence reputation management system should perform all the tasks in distributed fashion. When these kinds of systems are implemented, peers try to deceive them to take maximum advantage. This thesis describes ways of making reputation mechanisms more trustworthy and optimized by providing defense mechanism and analysis. Different kinds of malicious behaviors exist and for each one, we present a complete analysis, simulation and a real use case example in distributed and non-distributed way
Bradai, Amira. "Secured trust and reputation system : analysis of malicious behaviors and optimization." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0019.
Повний текст джерелаReputation mechanisms offer a novel and effective way of ensuring the necessary level of trust which is essential to the functioning of any critical system. They collect information about the history (i.e., past transactions) of participants and make public their reputation. Prospective participants guide their decisions by considering reputation information, and thus make more informative choices. Online reputation mechanisms enjoy huge success. They are present in most e-commerce sites available today, and are seriously taken into consideration by human users. Existing reputation systems were conceived with the assumption that users will share feedback honestly. But, such systems like those in peer to peer are generally compromise of malicious users. This leads to the problem in cooperation, aggregation and evaluation. Some users want to use resources from network but do not want to contribute back to the network. Others manipulate the evaluations of trust and provide wrong estimation. We have recently seen increasing evidence that some users strategically manipulate their reports and behave maliciously. For proper protecting against those users, some kind of reputation management system is required. In some system, a trusted third entity exists and can aggregate the information. However, Peer-to-peer networks don’t have any central control or repository. Large size of distributed and hybrid networks makes the reputation management more challenging task. Hence reputation management system should perform all the tasks in distributed fashion. When these kinds of systems are implemented, peers try to deceive them to take maximum advantage. This thesis describes ways of making reputation mechanisms more trustworthy and optimized by providing defense mechanism and analysis. Different kinds of malicious behaviors exist and for each one, we present a complete analysis, simulation and a real use case example in distributed and non-distributed way
Pinto, Coelho Joaquim José Vieira. "Les facteurs psychosociaux de l'efficacité organisationnelle : étude comparée des mairies portugaises." Metz, 2004. http://docnum.univ-lorraine.fr/public/UPV-M/Theses/2004/Pinto_Coelho.Joaquim.Jose.Vieira.LMZ0408_1.pdf.
Повний текст джерелаThis research required to examine variables that influence the organizational efectiveness in local government services. The mayoralty was used the unity of analysis and 92 mayors and 236 directors in 109 municipalities in Portugal participated in this study. The latent variables mayor's extensive leadership (G), strategic oriented leadership (S) and risk predisposed leadership R, director's satifaction and commitment, trust and cooperation climate were operationalized using factor analysis. Through structural equations modeling the research revealed significant positive mediate relationship between : G and satifaction, G and cooperation, S and commitment, S and trust, R and satisfaction, satisfaction and commitment and commitment and trust. Signicant negative mediate relatinship was found between G and commitment ; and a one hand, between R and, on the other, trust and cooperation. Direct effects from trust to overall perceived effectiveness and to level of investments execution rate were found. Financial indicators were not found to be significantly explained by the model. Significant differences for mayors and directors were found in the relation between G and satisfaction, R and satisfaction, S end trust and commitment and trust. Mayoralties supported by right and left ideologies were found to have significantly different perceptions between R and cooperation. Also, significant differences for lower and upper economic level municipalities were found between R satifaction and between R and cooperation. Behavioral styles of mayor are proposed and analyzed their effectiveness. The model was specified for others factors of leadership as perceived by the directors
Chaulet, Johann. "La confiance médiatisée : la confiance et sa gestion au sein des communications médiatisées." Toulouse 2, 2007. https://hal.archives-ouvertes.fr/tel-01252308.
Повний текст джерелаThis thesis is about the usages of mediated communication devices. Its aim is to understand how their generalization renews the way people “equip” and deal with their trust relationships. This interest for the notion of trust leads us to place the questions of information, availability, commitment and surveillance in the center of our analysis. Due to the pertinence of this broadening the study of “close relationships” has been complemented by relations centered around a specific goal (via the study of internet connecting websites) and contractual relationships in very equipped work places (in call centers). The diversity of these situations allows us to examine the confrontation of the two main concepts of mediation and trust. It seems that, if these mediations don't change the main grounds of trust, they do modify some aspects of relations to others and the uncertainty they imply. Our findings document the hypothesis of growing rationalization of communication and relational practices based, mainly, on new information that those always more numerous mediations produce
Vu, Van-Hoan. "Infrastructure de gestion de la confiance sur internet." Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2010. http://tel.archives-ouvertes.fr/tel-00611839.
Повний текст джерелаMasmoudi, Khaled. "Gestion de la confiance dans les réseaux personnels." Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0002.
Повний текст джерелаWith the advent of new networking paradigms and evolutions, spanning from distributed and self-organized systems such as ad hoc networks, P2P networks or grids, to pervasive computing, wireless mesh networks or embedded devices, many research effort have been conducted to bring the previous theoretic concepts into real life. Security protocols have to fulfill a new requirement : how is it possible to establish trust between parties without any a priori credential, central administration or shared context ? We go even farther in this dissertation : what if each single party was a heterogeneous distributed domain ? This thesis builds a layered architecture with a set of cryptographic protocols, meant to establish trust between devices and services belonging to different users through their Personal Networks. In the first part, the trust vector is an out-of-band channel, based on proximity. The resulting protocols combine identity-based cryptography to link identities to cryptographic material, and cryptographically-generated addresses to provide identity ownership. These new identifiers form a novel namespace that allows cross-layer trust establishment. The de facto security negotiation protocols, namely Internet Key Exchange protocol and Transport layer Security handshake sub-protocol, provide end-to-end secure tunnel establishment, but fail to fit scenarios when a domain controller has to define the security parameters for a device under its supervision. We define in the second part of this dissertation how extensions could be applied to fullfill the previous requirement and delegate tunnel negotiation to a third party. Security validation results and the details of a preliminary implementation are also provided. Last, we design a framework for establishing trust basing on the entity behavior within a group of Personal Networks that share a part of their devices and services. Focusing on service discovery, we show that reputation-based trust can be applied to mitigate selfishness and fake announcements in a federation of Personal Networks
Ould, yahia Youcef. "Proposition d’un modèle de sécurité pour la protection de données personnelles dans les systèmes basés sur l’internet des objets." Thesis, Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1242/document.
Повний текст джерелаInternet of Things (IoT) and IT service outsourcing technologies have led to the emergence of new threats to users' privacy. However, the implementation of traditional security measures on IoT equipment is a first challenge due to capacity limitations. On the other hand, the offloading of data processing and storage poses the problem of trust in service providers.In this context, we have proposed an encryption solution that provides owner-centric data protection adapted to the constraining environment of IoT. This model is based on attribute-based encryption with secure offloading capability and Blockchain technology. Then, in response to the issue of trust and service selection, we explored the possibilities offered by artificial intelligence tools. To do this, we proposed a collaborative filtering model based on Kohonen maps and efficient solution to detect the untrusted users
Evans, William. "Trust in Japanese management and culture." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00873698.
Повний текст джерелаКниги з теми "Modèles de gestion de la confiance"
Institut de socio-économie des entreprises et des organisations., ed. Confiance et gestion. Grenoble: Presses Universitaires de Grenoble, 1998.
Знайти повний текст джерелаRoss, André. Modèles mathématiques en gestion. Sainte-Foy: Le Griffon d'argile, 1987.
Знайти повний текст джерелаMarsland, Jane. Modèles de gestion souples: Rapport final. Ottawa, Ont: Conseil des arts du Canada, 2005.
Знайти повний текст джерелаVédrine, Jean-Pierre. Techniques quantitatives de gestion. Paris: Librairie Vuibert, 1985.
Знайти повний текст джерелаGalanos, Jean. Système d'information comptable et modèles de gestion émergents. Grenoble: A.N.R.T. Université Pierre Mendès France Grenoble 2, 1991.
Знайти повний текст джерелаKurpiel, Adam. Valorisation et gestion d'options: Modèles à volatilité stochastique. Grenoble: A.N.R.T, Université Pierre Mendes France (Grenoble II), 2000.
Знайти повний текст джерелаWidmer, Marino. Modèles mathématiques pour une gestion efficace des ateliers flexibles. Lausanne: Presses polytechniques et universitaires romandes, 1991.
Знайти повний текст джерелаLevesque, Aline A. Supervision et gestion: Essai sur le développement de modèles. Sudbury, Ont: École de Service Social, Université Laurentienne, 1997.
Знайти повний текст джерелаHamon, Jacques. Bourse et gestion de portefeuille. Paris: Economica, 2004.
Знайти повний текст джерелаHamon, Jacques. Bourse et gestion de portefeuille. 2nd ed. Paris: Economica, 2005.
Знайти повний текст джерелаЧастини книг з теми "Modèles de gestion de la confiance"
Phalip, Bruno. "Une acculturation difficile. L’Auvergne féodale, ses modèles architecturaux, la romanité et l’intégration au royaume de France (XIIe-XIIIe siècles)." In Lieu de pouvoir, lieu de gestion, 7–17. Turnhout: Brepols Publishers, 2011. http://dx.doi.org/10.1484/m.stmh-eb.1.100035.
Повний текст джерелаGaussot, Ludovic, and Nicolas Palierne. "Chapitre II. Gestion de l’information et gestion des consommations." In La confiance dans les relations familiales, 73–116. Presses universitaires de Rennes, 2020. http://dx.doi.org/10.4000/books.pur.148615.
Повний текст джерела"LES MODÈLES DE GESTION MÉTROPOLITAINE:." In Penser métropolitain, 5–34. Presses de l'Université du Québec, 2012. http://dx.doi.org/10.2307/j.ctv18pgq3v.8.
Повний текст джерела"Les Modèles de Gestion Métropolitaine." In Penser métropolitain?, 5–34. Presses de l'Université du Québec, 2012. http://dx.doi.org/10.1515/9782760534933-006.
Повний текст джерелаServant, Dominique. "Modèles explicatifs des psychothérapies." In Gestion du Stress et De L'anxiété, 23–39. Elsevier, 2012. http://dx.doi.org/10.1016/b978-2-294-71312-5.00002-8.
Повний текст джерелаServant, Dominique. "Médicaments et modèles neurobiologiques." In Gestion du Stress et De L'anxiété, 41–49. Elsevier, 2012. http://dx.doi.org/10.1016/b978-2-294-71312-5.00003-x.
Повний текст джерелаServant, Dominique. "Modèles explicatifs des psychothérapies." In Gestion du Stress et de L'anxiété, 23–42. Elsevier, 2022. http://dx.doi.org/10.1016/b978-2-294-77735-6.00002-1.
Повний текст джерелаServant, Dominique. "Médicaments et modèles neurobiologiques." In Gestion du Stress et de L'anxiété, 43–66. Elsevier, 2022. http://dx.doi.org/10.1016/b978-2-294-77735-6.00003-3.
Повний текст джерела"LA GESTION DES STOCKS." In Modèles probabilistes d'aide à la décision, 223–90. Presses de l'Université du Québec, 1986. http://dx.doi.org/10.2307/j.ctv18pgvn2.7.
Повний текст джерелаServant, Dominique. "Concepts et modèles de l’anxiété." In Gestion du Stress et De L'anxiété, 1–22. Elsevier, 2012. http://dx.doi.org/10.1016/b978-2-294-71312-5.00001-6.
Повний текст джерелаТези доповідей конференцій з теми "Modèles de gestion de la confiance"
Sannino, Christian, Jonathan Sprauel, and Christel Seguin. "Modèles dysfonctionnels pour la gestion de la qualité de service des systèmes critiques." In Congrès Lambda Mu 20 de Maîtrise des Risques et de Sûreté de Fonctionnement, 11-13 Octobre 2016, Saint Malo, France. IMdR, 2016. http://dx.doi.org/10.4267/2042/61853.
Повний текст джерела"Formalisation des politiques de sécurité, gestion de la confiance, management de la sécurité." In 2012 National Days of Network Security and Systems (JNS2). IEEE, 2012. http://dx.doi.org/10.1109/jns2.2012.6249229.
Повний текст джерелаЗвіти організацій з теми "Modèles de gestion de la confiance"
Moran, Kevin, Dalibor Stevanovic, and Adam Kader Touré. Confiance et activité économique : analyse d’impact sur l’économie canadienne. CIRANO, June 2023. http://dx.doi.org/10.54932/pamp8753.
Повний текст джерелаMoran, Kevin, Dalibor Stevanovic, and Adam Kader Touré. Le pessimisme risque de nous plonger dans une récession. CIRANO, September 2023. http://dx.doi.org/10.54932/htmw1091.
Повний текст джерелаBeaurain, Christophe, Julien Bernard, Iratxe Calvo-Mendieta, Hervé Flanquart, Séverine Frère, Frédéric Gonthier, Anne-Peggy Hellequin, and Antoine Le Blanc. Les risques et pollutions industriels sur le territoire dunkerquois: des perceptions à la «concertation». Fondation pour une culture de sécurité industrielle, July 2010. http://dx.doi.org/10.57071/255dkr.
Повний текст джерелаBordeleau, Raphaëlle, Mathilde Montpetit, Jade Jost, Régis Blais, Delphine Bosson-Rieutort, Géraldine Layani, and Nadia Sourial. Quels seront les soins de santé de première ligne du futur ? Compte-rendu du 40e Colloque Jean-Yves Rivard. CIRANO, February 2024. http://dx.doi.org/10.54932/oocl1335.
Повний текст джерелаJocelyn, Sabrina, Élise Ledoux, Damien Burlet-Vienney, Isabelle Berger, Isvieysys Armas Marrero, Chun Hong Law, Yuvin Chinniah, et al. Identification en laboratoire des éléments essentiels au processus d’intégration sécuritaire de cellules cobotiques. IRSST, August 2024. http://dx.doi.org/10.70010/qkwy4060.
Повний текст джерелаDudoit, Alain. Les espaces européens communs de données : une initiative structurante nécessaire et adaptable au Canada. CIRANO, October 2023. http://dx.doi.org/10.54932/ryht5065.
Повний текст джерелаDans l'œil de l'Obvia - Vers une identité numérique au Québec : Enjeux et défis. Observatoire international sur les impacts sociétaux de l'intelligence artificielle et du numérique, May 2024. https://doi.org/10.61737/dnfc4193.
Повний текст джерелаLes forêts françaises face au changement climatique. Académie des sciences, June 2023. http://dx.doi.org/10.62686/6.
Повний текст джерела