Дисертації з теми "Spécification de protocoles"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-36 дисертацій для дослідження на тему "Spécification de protocoles".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Duchene, Julien. "Développement et évaluation d'obfuscations de protocoles basées sur la spécification." Electronic Thesis or Diss., Toulouse, INSA, 2018. http://www.theses.fr/2018ISAT0054.
Повний текст джерелаThere are more and more protocols. Many of them have their specification available for interoperability purpose for instance. However, when it comes to intellectual property, this specification is kept secret. Attackers might use a wrongly implemented protocol to compromise a system, if he has access to the specification, it’s attack would be far more efficient. Even if he does not have access to the specification, he can reverse-engine it. Thus, create protocols hard to reverse is interesting. In this thesis, we develop a novel approach of protocol protections to make protocol reverse engineering more complex. We apply some obfuscations on protocol message format, furthermore, we do it automatically from the original protocol specification. Firstly, we have analyzed more than 30 different contributions of protocol reverse engineering tools. We retrieved the following elements : 1) Protocol reverse engineering tools try to infer regular models ; 2) They suppose that the parsing is done from left to right ; 3) They delimit fields based on well-known delimiters or with ad-hoc techniques ; 4) They cluster messages based on pattern similarity measures. Thus, to make protocol reverse harder, one can create protocols which does not respect theses statements. Secondly, we have proposed a model of message format on which obfuscations can be applied. With this model, we also provide some atomic obfuscations which can be composed. Each obfuscation target one or more protocol reverse engineering hypothesis. Obfuscation composition ensures effectiveness of our solution and makes protocol reverse-engineering more complex. This model is used to automatically generate code for parser, serializer and accessors. This solution is implemented into a framework we called ProtoObf. ProtoObf is used to evaluate obfuscations performance. Results show an increase of protocol complexity with the number of obfuscation composition while costs (particularly the serialized buffer size) stay low
Chatzikokolakis, Konstantinos. "Spécification et vérification des protocoles de sécurité probabilistes." Phd thesis, Ecole Polytechnique X, 2007. http://pastel.archives-ouvertes.fr/pastel-00003950.
Повний текст джерелаYahmadi, Imed. "Vers un calcul pour la spécification et l'analyse des protocoles cryptographiques." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp04/mq26295.pdf.
Повний текст джерелаBonet, d'Oléon Karen de. "Spécification et validation du protocole de communication KerNet+." Nantes, 1991. http://www.theses.fr/1991NANT2066.
Повний текст джерелаRodriguez, Carlos. "Spécification et validation de systèmes en Xesar." Phd thesis, Grenoble INPG, 1988. http://tel.archives-ouvertes.fr/tel-00326427.
Повний текст джерелаRieu, Christine. "Outil d'aide à la spécification et à l'implémentation de protocoles de transfert." Clermont-Ferrand 2, 1989. http://www.theses.fr/1989CLF21105.
Повний текст джерелаRomero, Hernandez Ivan. "Modélisation, spécification formelle et vérification de protocoles d'interaction : une approche basée sur les rôles." Grenoble INPG, 2004. http://www.theses.fr/2004INPG0159.
Повний текст джерелаLn this thesis we present an approach for specifying, modelling and validating agent interaction protocols. This approch is based on the notion of role attribute, as it is implied on the agent-oriented methodologies MADKIT and GAIA. Roles could be seen as social attributes of agent groups, that are taken in the context of any given interaction. If we see roles like this, we could also imagine schemes to generate an actual specification with concrete agents from the generic specification using roles. To test this approch we propose a machine-assisted specification process that takes a role definiton expressed on a visual notation (AUML), and generates a formai equivalent on the language Promela
Dakroury, Yasser. "Spécification et validation d'un protocole de messagerie multi-serveur pour l'environnement MMS." Nantes, 1990. http://www.theses.fr/1990NANT2041.
Повний текст джерелаAuriol, Guillaume. "Spécification et implémentation d'une architecture de signalisation à gestion automatique de la QdS dans un environnement IP multi domaines." Toulouse, INSA, 2004. http://www.theses.fr/2004ISAT0029.
Повний текст джерелаThe future Internet will have to transport the new application data with Quality of Service (QoS) guarantees. Then, it is necessary to redesign its architecture. In other respect, by definition, the Internet consists of several autonomous domains with their own QoS management mechanisms. This last point raises the question to carry the service continuity over all the domains. Then, to solve these two precedent problems the work presented in this thesis proposes a communication system providing guarantees of QoS in a multi-domain environment. This system is composed of both a communication plane and a signaling plane. The first one provides multi IP and Transport services when the second one manages the resources between the involved domains. Our contributions are the following ones. Firstly, we propose a model to characterize the IP and Transport services based on experiments over a national platform, ns-2 simulations and measurements performed over a DiffServ multi-domain emulation platform. Then, we upgrade a previous proposed communication architecture integrating this model to simplify the user task. Actually, the system is able to select automatically the appropriated Transport and IP services to satisfy the users. Secondly, we specify in UML and we implement in Java our signaling architecture providing the guarantee of the service continuity over all involved domains. Finally, we test, by the mean of two kinds of application, the complete system over a platform which emulates the behavior of several DiffServ domains
Jacinto, Montes Ricardo R. "Protocoles de validation à deux phases dans les systèmes transactionnels répartis : spécification, modélisation et vérification." Toulouse 3, 1995. http://www.theses.fr/1995TOU30050.
Повний текст джерелаAndrey, Laurent. "Protocoles de communication et grammaires attribuées." Nancy 1, 1993. http://www.theses.fr/1993NAN10083.
Повний текст джерелаTalbi, Mehdi. "Spécification et vérification automatique des propriétés des protocoles de vote électronique en utilisant la logique ADM." Rennes 1, 2010. http://www.theses.fr/2010REN1S073.
Повний текст джерелаIt is a well known fact that only formal methods can provide a proof that a given system meets its requirements. Their use should be mandatory for critical systems such as electronic voting. In this thesis, we propose the use of the modal and linear ADM logic in order to specify a set of security properties that a voting protocol is required to satisfy : eligibility, non-reusability, accuracy, fairness, anonymity, receipt-freeness, etc. Our goal is to check these properties against a trace-based model where a trace represents a valid run of the protocol. Protocol executions take place in a hostile environment controlled by an active intruder whose deduction power is incremented according to electronic voting cryptographic primitives (blind signature, bit-commitment, homomorphic encryption, zero-knowledge proof, etc. ). Protocol modeling and properties specification are applied to the FOO protocol as a case study. Additionally, we propose to exploit the tableau-based proof system of the ADM logic, in order to develop a tool enabling the automatic verification of security properties against selected traces of the analyzed protocol
Dupeux, Arnaud. "Spécification et implantation de protocoles OSI : une expérience de la couche transport dans le langage ADA." Bordeaux 1, 1986. http://www.theses.fr/1986BOR10527.
Повний текст джерелаZwecker, Stella. "Représentation et spécification d'architectures d'interconnexion de réseaux hétérogènes vers la définition d'une base de connaissances." Toulouse 3, 1993. http://www.theses.fr/1993TOU30052.
Повний текст джерелаAyoub, Dit Ayadi Mohamed. "Contribution à la spécification formelle et vérification d'architectures de communication pour les transactions distribuées (couches hautes du modèle de référence OSI DE L'ISO)." Toulouse 3, 1990. http://www.theses.fr/1990TOU30118.
Повний текст джерелаGarnier, Gérard. "Modélisation de protocoles : application à la couche liaison de données de F.I.P." Nancy 1, 1992. http://www.theses.fr/1992NAN10308.
Повний текст джерелаSaad, Khorchef Fares. "Cadre Formel pour le Test de Robustesse des Protocoles de Communication." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2006. http://tel.archives-ouvertes.fr/tel-00138202.
Повний текст джерелаdes événements imprévus. La littérature concernant le test de robustesse est beaucoup moins conséquente que le test de conformité. A travers ce document, nous considérons la définition de la robustesse suivante : "la capacité d'un système, conforme à sa spécification nominale, à adopter un comportement acceptable en présence d'aléas". Notre approche se fonde sur l'analyse du comportement du système face à des aléas. On considérera comme aléa tout événement non prévu amenant le système à une impossibilité temporaire ou définitive d'exécuter une action. Les contributions principales de ce document sont brièvement présentées ci-dessous :
(1) Proposition d'un cadre formel comportant une approche, une relation de robustesse et méthode pour générer les cas de test de robustesse d'un système modélisé sous forme d'IOLTS. Notre approche comporte deux méthodes :
- La méthode TRACOR (Test de Robustesse en présence d'Aléas COntrôlables et Représentables) consiste à vérifier la robustesse d'un système en présence d'aléas contrôlables et représentables. Cette méthode intègre les entrées invalides, entrées inopportunes, sorties
acceptables et traces de blocage dans la spécification nominale, pour obtenir une spécification augmentée. Cette dernière servira de base pour la génération de séquences de test de robustesse.
- La méthode TRACON (Test de Robustesse en présence d'Aléas COntrôlables et Non représentables) est focalisée sur le test de robustesse en présence d'aléas contrôlables et non représentables. Elle consiste à enrichir la spécification nominale par les sorties acceptables et les traces de suspension afin d'obtenir la spécification semi-augmentée. Cette dernière servira de base pour la génération de séquences de test de robustesse.
(2) Pour formaliser la robustesse d'une implémentation vis-à-vis de la spécification augmentée (ou la spécification semi-augmentée), nous proposons une relation binaire, appelée "Robust", basée sur l'observation des sorties et blocages de l'implémentation après l'exécution de traces comportant les aléas.
(3) Afin de générer les cas de test de robustesse, nous proposons une méthode basée sur un coloriage de la spécification augmentée (ou la spécification semi-augmentée) et un ensemble d'objectifs de test de robustesse.
(4) Les fondements de notre approche sont implémentés dans l'outil RTCG. Cette application offre trois interfaces. La première et la deuxième permettent d'automatiser la méthode TRACOR. La troisième interface permet d'automatiser la méthode TRACON.
(5) Une étude de cas, sur les protocoles SSL handshake et TCP, montrant une évaluation
pratique de notre approche.
Elabd, Emad. "Conformité de services Web par rapport à des spécifications de haut niveau." Phd thesis, Université Claude Bernard - Lyon I, 2011. http://tel.archives-ouvertes.fr/tel-00867892.
Повний текст джерелаAmyay, Omar. "Méthodologie de spécification d'activités de communication dans une architecture multi-couches vers la définition d'une base de connaissances." Toulouse 3, 1991. http://www.theses.fr/1991TOU30209.
Повний текст джерелаElabd, Emad. "Compliance of Web services over a high level specification." Thesis, Lyon 1, 2011. http://www.theses.fr/2011LYO10122/document.
Повний текст джерелаCurrently, Web services technology is rapidly move forward supported by major players in the field of information systems. Web services applications are loosely coupled and usable in an automatic way via the use of a set of standards based on XML. Beside the syntactic description of messages, there is a need for the semantic description of the behavior of services. Indeed, whether in the design of a service or composition of services, it is important to check compliance with a set of specifications. Enriching services descriptions by including their behaviors is becoming more and more important. This behavior can be described by business protocols representing the possible sequences of message exchanges. Web services use access control policies (ACP) to restrict the access to authorized consumer. These policies should be a part of the service description. In this thesis, the interoperability analysis in terms of AC after the formalization of the Web services annotated with the access control (AC) is performed. In addition, we present an approach for embedding the checking tools in the AC enforcement architecture to guarantee the errors free interaction. The ACP and the credentials are presented as ontology in order to benefit from the flexibility offered by subsumption on concepts. Web services choreography is used in the design phase of complex peer-to-peer applications in which each peer can be implemented by a Web service. Therefore, selecting Web services for choreography implementation using the compatibility checking approach with access control is one of the objectives of our research. In this work, the business protocol models of the Web service are extended by adding information to the message on each transition about the service in which this message will sent to or received from. We define and verify Web service compatibility in order to see if (and how) several services can have interactions based on their protocols. This approach will help the designers to select Web services in an easy way and verify if they can implement the required choreography or not by checking the compatibly using our approach
Bhatia, Sapan. "Optimisations de compilateur optimistes pour les systèmes réseaux." Bordeaux 1, 2006. http://www.theses.fr/2006BOR13169.
Повний текст джерелаLambolais, Thomas. "Modélisation du développement de spécifications LOTOS." Vandoeuvre-les-Nancy, INPL, 1997. http://www.theses.fr/1997INPL106N.
Повний текст джерелаViho, Gagnon Gbédé. "Une contribution à la suppression des anomalies dans les protocoles de communication." Bordeaux 1, 1991. http://www.theses.fr/1991BOR10573.
Повний текст джерелаAllouis, Tristan. "Spécification de paramètres techniques et stratégie d'échantillonnage pour la conception de nouveaux capteurs lidars dédiés à la cartographie de forêts." Thesis, Paris, AgroParisTech, 2011. http://www.theses.fr/2011AGPT0086/document.
Повний текст джерелаForesters need tools to map the tree species, tree heights, stand structure and biomass. Although the airborne lidar (Light detection and ranging) technology does not give access to all these variables, it can provide quick, accurate and spatially explicit measurements of tree heights and biomass over large surfaces. However, lidar systems currently used have not been specially designed to performed vegetation studies. The adjustment of the technical characteristics of such systems is expected to improve the accuracy of retrieved forest parameters. Consequently, the objective of this thesis is to determine configurations of lidar sensors dedicated to the study of forest vegetation, and to propose methods designed to extract forest parameters depending on the different configurations. The ability of different resolutions (footprint size and spatial sampling), wavelengths and sampling modes of the backscattered signal to measure forest parameters (canopy height and density, crown size and also volume and biomass) was evaluated. The studies were conducted from tree to stand level, on experimental or simulated data. In a first part, we developed methods to process classic airborne lidar data (scanner system, tens of centimeter footprint, 5 measurements/m², near-infrared laser) for the estimation of the biomass of individual trees. In this study, we demonstrated the contribution of new data called "Full-waveform" (recording the entire signal) compared to traditional multi-echoes data (extraction of the most significant echoes). In a second part, we performed an experiment using a Comissariat of Energy Atomique (CEA)'s lidar prototype onboard an ultra-light aircraft (profiler system, 2.4 m footprint, 2.4 m spacing between two measurements along the flight line, ultraviolet laser). Such a configuration did not allow to measure individual trees, but we were able to study variations in forest structure at the plot level (30 m diameter). Having demonstrated the ability of an ultraviolet lidar to perform vegetation studies, this sensor opens the way to the development of bi-functional lidar for both atmosphere and vegetation remote sensing. In a third part, large footprint lidar signals (tens of meters on the ground) were simulated from the aggregation of classical airborne lidar signals. We proposed a method for modeling the signal dynamics of satellite lidars in different forest types, in order to calibrate the energy to emit for a future space-borne mission. The main problem with large-footprint size is the strong influence of topography on accurate measurements of tree heights in steep areas. We consequently developed a method to correct this effect, thus increasing the accuracy of tree height retrieval. This approach also opened new perspectives in topography assessment from large-footprint data in forest environments
Dridi, Khaled. "Spécification du protocole MAC pour les réseaux IEEE 802.11e à différentiation de services sous contrainte de mobilité." Thesis, Paris Est, 2011. http://www.theses.fr/2011PEST1016/document.
Повний текст джерелаThis thesis proposes a new approach relating to the packets scheduling algorithm, the cooperation scheme and the nodes' mobility for IEEE 802.11 wireless network family. Considering the QoS delivery process at the MAC level consists the main feature of the proposal research study. The analysis of the current mechanisms leads to keep the protocol EDCF as the basic model for our work platform. In order to overcome the weakness of the earlier 802.11 standard, a new model based on multi-scheduler algorithm, called HCF-T, is proposed. The achieved performances are summarized following several criteria: traffic control, throughput improving, collisions avoidance, and network load decreasing. Furthermore, in the way of getting better results according to the PHY layer, we presented and analyzed a model of cooperative diversity scheme. It included a couple of relaying protocols AAF and DAF supported by a set of combining techniques to backup the signal at the receiver. To support node's mobility within EDCF, we built-up a model of WLAN which able to track node motion and control the access as in real condition. In the case of overlapping APs ranges, we developed a Multi-coverage algorithm aiming to carry out the session associations. As a result, three levels (Low, Medium, and High) of node's speed are discerned. Finally, EDCF has been implemented on various static and dynamic scenarios. The performances, based on the main MAC-layer metrics, such as throughput, End-2-End delay, and jitter, have been classified and comprehensively evaluated
Corrales, Juan-Carlos. "Appariement de spécifications de comportements pour la découverte de services." Phd thesis, Université de Versailles-Saint Quentin en Yvelines, 2008. http://tel.archives-ouvertes.fr/tel-00323970.
Повний текст джерелаMotivated by these concerns, we developed the WS-BeM platform for ranking web services based on behavior matchmaking, which takes as input two WSCL or BPEL protocols and evaluates the semantic distance between them. The prototype is also available as a web service. Furthermore, an application is described concerning the tool for evaluating the effectiveness of the behavioral matchmaking method.
Dridi, Khaled, and Khaled Dridi. "Spécification du protocole MAC pour les réseaux IEEE 802.11e à différentiation de services sous contrainte de mobilité." Phd thesis, Université Paris-Est, 2011. http://tel.archives-ouvertes.fr/tel-00681041.
Повний текст джерелаExposito, Garcia Ernesto José. "Spécification et mise en oeuvre d'un protocole de transport orienté Qualité de Service pour les applications multimédias." Toulouse, INPT, 2003. http://www.theses.fr/2003INPT028H.
Повний текст джерелаZouinkhi, Ahmed. "Contribution à la modélisation de produit actif communicant, Spécification et Evaluation d'un protocole de communication orienté sécurité des produits." Phd thesis, Université Henri Poincaré - Nancy I, 2011. http://tel.archives-ouvertes.fr/tel-00594402.
Повний текст джерелаZouinkhi, Ahmed. "Contribution à la modélisation de produit actif communicant : spécification et évaluation d'un protocole de communication orienté sécurité des produits." Thesis, Nancy 1, 2011. http://www.theses.fr/2011NAN10010/document.
Повний текст джерелаMonitoring of chemical product storage is a delicate operation in the sense that it requires knowledge of the nature of each stored product, their location, their interaction and possible actions to be implemented in case of emergency. To facilitate the storage management, this thesis proposes to use the concept of ambient where the product has its own information system and wireless communication so as to make it intelligent and autonomous. This thesis proposes and develops a model of internal behavior of active product that allows a distributed approach of active security. This can lead to a communication protocol of application level to embed the active products. This protocol is formally assessed using hierarchical colored Petri nets. Finally, this protocol is implemented in the simulator Castalia/Omnet++ to analyze it in several scenarios and also for the experience when going to scale. The results show the usefulness and feasibility of the concept of active product
Villemur, Thierry. "Conception de services et de protocoles pour la gestion de groupes coopératifs." Phd thesis, Université Paul Sabatier - Toulouse III, 1995. http://tel.archives-ouvertes.fr/tel-00146528.
Повний текст джерелаDiaz, Nava Mario. "Proposition d'une méthodologie de conception de circuits intégrés de communication : réalisation d'un communicateur pour le réseau local FIP." Phd thesis, Grenoble INPG, 1986. http://tel.archives-ouvertes.fr/tel-00320454.
Повний текст джерелаMatiedje, Tawa Jeanne. "Extension événementielle d'une méthode formelle légère et application à l'analyse du protocole distribué Chord." Thesis, Toulouse, ISAE, 2019. http://www.theses.fr/2019ESAE0029.
Повний текст джерелаThis study deals with the use of first-order logic and linear temporal logic for specificationand verification of dynamics system with rich structural properties. It also concerns the studyof the operating safety of the distributed lookup protocol Chord. The aim is on the one hand toimprove the specification and verification of systems whith the formal language Electrum a dynamicextension of the formal language Alloy based on first-order linear temporal logic. To do this, we havedeveloped an action layer above Electrum. The purpose of this layer is to make the specification ofthe behavior in Electrum easier, to do this, we have defined a syntax to automatically generate partof the specification of the behavior. Moreover, this layer also makes it possible to reduce specificationerrors by getting rid the users of the specification of certain laborious and error-prone behavioraltasks. On the other hand, the aim is the formal analyzing of the fundamental liveness property ofthe Chord protocol. To do this, we specified and verified the Chord protocol with the extension ofElectrum that we have developed, then we proved its correctness and showed the advantages of ouranalysis method
Gineste, Mathieu. "Spécification d'un cadre générique pour l'expression et le déploiement de la Qualité de Service dans les architectures de communication : application à une architecture de communication par satellite." Paris 6, 2006. http://www.theses.fr/2006PA066267.
Повний текст джерелаRomero-Hernandez, Ivan. "Modélisation, spécification formelle et vérification de protocoles d'interaction: une approche basée sur les rôles." Phd thesis, 2004. http://tel.archives-ouvertes.fr/tel-00266421.
Повний текст джерелаZemmouri, Fathya. "Un modèle de validation automatique de mécanismes de sécurisation des communications." Thèse, 2003. http://hdl.handle.net/1866/14537.
Повний текст джерела