Academic literature on the topic 'Agent de sécurité'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Agent de sécurité.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Agent de sécurité"
Thibault, Martin. "Agent RATP plutôt qu'ouvrier, la sécurité ?" Actes de la recherche en sciences sociales 175, no. 5 (2008): 34. http://dx.doi.org/10.3917/arss.175.0034.
Full textDesrosiers, Julie. "Les agents de sécurité privée doivent-ils respecter les droits conférés par la Charte canadienne des droits et libertés ?" Les Cahiers de droit 45, no. 2 (April 12, 2005): 351–70. http://dx.doi.org/10.7202/043799ar.
Full textBoyer, Marcel, and Georges Dionne. "Riscophobie et étalement à moyenne constante : analyse et applications." Articles 59, no. 2 (July 21, 2009): 208–29. http://dx.doi.org/10.7202/601213ar.
Full textLe Gouriellec, Sonia. "Sécuritisation et construction d’un complexe de sécurité régional dans la Corne de l’Afrique." Études internationales 49, no. 1 (July 18, 2018): 83–104. http://dx.doi.org/10.7202/1050545ar.
Full textAnderson, Alyssa Erin, and Gordon Hensel. "Les opticiens de l’Alberta possèdent-ils les compétences requises pour exécuter des examens de la réfraction et prescrire un appareil optique de façon autonome et en toute sécurité?" Canadian Journal of Optometry 83, no. 1 (February 25, 2021): 25–36. http://dx.doi.org/10.15353/cjo.v83i1.3602.
Full textRoché, Sébastian. "Le contrôle civil de la sécurité intérieure en Turquie : entre concurrence des pouvoirs et relations principal - agent." Archives de politique criminelle 33, no. 1 (2011): 201. http://dx.doi.org/10.3917/apc.033.0201.
Full textMalo, Jean-Luc, Jocelyne L’Archevêque, and Heberto Ghezzo. "Direct Costs of Occupational Asthma in Quebec between 1988 and 2002." Canadian Respiratory Journal 15, no. 8 (2008): 413–16. http://dx.doi.org/10.1155/2008/324305.
Full textGouya, L., and A. Simon. "ENVISION, étude de phase 3 sur la sécurité et l’efficacité de Givosiran, un agent ARNi thérapeutique expérimental, chez des patients atteints de porphyrie hépatique aiguë." La Revue de Médecine Interne 40 (December 2019): A189. http://dx.doi.org/10.1016/j.revmed.2019.10.284.
Full textGouya, L., M. Balwani, E. Sardh, and P. Ventura. "Analyse intermédiaire sur douze mois portant sur l’efficacité et la sécurité d’emploi du givosiran, un agent thérapeutique ARNi expérimental pour la porphyrie hépatique aiguë, dans l’étude d’extension en ouvert ENVISION." La Revue de Médecine Interne 41 (December 2020): A185—A186. http://dx.doi.org/10.1016/j.revmed.2020.10.315.
Full textZargayouna, Mahdi, and Flavien Balbo. "Langage de coordination multi-agent sécurisé." Revue d'intelligence artificielle 27, no. 3 (April 30, 2013): 271–98. http://dx.doi.org/10.3166/ria.27.271-298.
Full textDissertations / Theses on the topic "Agent de sécurité"
Caval, Costin. "Agents dirigés par des buts pour la tolérance aux fautes imprévues. Un filet de sécurité pour les programmeurs." Thesis, Paris 6, 2016. http://www.theses.fr/2016PA066135/document.
Full textThere are situations in software development when potential faults can be omitted, e.g. when the complexity hides faults from a rigorous development process, or when due to cost and time constraints on the fault tolerance effort, risks are assumed, either consciously or not. The first contribution of this thesis is a development framework – design, language and platform requirements – for producing software that is tolerant to unforeseen faults, i.e. faults that were not covered in the implementation. We propose (1) the use of a multi-agent architecture with goal-driven agents benefits the confinement of errors and the subsequent system recovery; (2) language requirements that constrain the programmers in order to limit the possible faults and in the same time localise the areas where other faults can be present and (3) execution platform requirements in order to ensure the desired fault tolerance properties. We illustrate the approach by discussing design and implementation using an adapted agent programming language and platform. The second contribution focuses on the way goal-driven agents are programmed. The issue is that many approaches to cognitive agent modelling permit the agent developers to interweave the levels of plans and goals, through the adoption of new goals inside plans. These goals will have plans of their own, and the definition can extend on many levels, with the resulting complexity rendering the agents’ behaviour difficult to trace. We thus propose imposing a clear separation between the reasoning and the acting levels of the agent. We argue that by constraining the agent model we gain in clarity therefore benefiting the development process
Huin, Leslie. "Sécurité d'accès dans les Systèmes d'Information Coopératifs : modélisation et Implémentation à l'aide d'agents." Thesis, Lyon 3, 2012. http://www.theses.fr/2012LYO30028.
Full textSharing heterogeneous and distributed independent data sources can be solved by building a Cooperative Information System (CIS). A CIS is a set of components, exchanging information, expertise and coordinating their activities. This must consider interoperability related to differences of data description and semantic. Data management is provided without using a comprehensive global scheme to respect the autonomy of local databases.In this context, we chose to treat access security in order to ensure confidentiality and data integrity in a cooperation. This adds new security issues regarding heterogeneity and conflict resolution, on top of those in terms of data cooperation. We use two canonical models proposed by the MODEME team, to represent the local schemas and security policies in a unified way.We build a system to manage the interoperation of data and security policies, and the resolution of secure global queries. We have chosen to implement our system using the multi-agent paradigm, with an schema integration and mediation approach. Two protocols have been defined related to the features of the system: - A knowledge management protocol to address the problem of interoperability between different modes of data representation and security models, and to generate the matches between these different models. - A query resolution protocol using the global knowledge, which aims to present the results semantically consistent and secure. Agents are described in their goals, their interactions, their knowledge by defining their role for each protocol, including the key role of security mediator. An experimental scenario illustrates the knowledge generation from local schemas and the development of protocol for access control
Bresson, Jonathan. "Le conflit, du face-à-face au corps à corps : une immersion comme agent de sécurité en établissements de nuit." Thesis, Rennes 2, 2018. http://www.theses.fr/2018REN20019.
Full textNightclub security officer’s daily job is punctuated by physical violence. Their roles as bouncer and doorman aim to prevent, track down and manage conflicts. Their professional activity is structured around the perspective of physical brutality and the risk of the occurrence of tragic events. The field work of this original research consists of the observation and analyze of conflicts: the face to face and hand to hand, excluding intimate violence and lynching. Violence in night spots constitue a worldwide criminological problem. However, it remains absent from French researches. Bodily immersion and observations by enactment ethnography are appropriate ways to study legally risky and mythologizing situations. E. Goffman’s sociology is an interesting starting point to analyze the conservation and the rupture of frames, swinging between the situation and the situated social performances. The study shows that the face to face conflict follows a graduated process: from clash to brawl, threw fight, being an interaction ritual. This disorder element, that sometimes seems confused, has its origins anchored in the violence culture which it structures in return. Conflict stays organized and is an organization element of the social order. Having an understanding of it brings back to the notion of physical brutality and questions the threshold of thedefinition of “violence”, the feeling of aggression and the “acting out” in a situationist and processual research dynamic in which moves, gestures and movement themselves become key elements
Idrissi, Hind. "Contributions to the security of mobile agent systems." Thesis, La Rochelle, 2016. http://www.theses.fr/2016LAROS022/document.
Full textRecently, the distributed computing has witnessed a great evolution due to the use of mobile agent paradigm, endowed with innovative capabilities, instead of the client-server system where the applications are bound to particular nodes in networks. Having captured the interest of researchers and industry, the mobile agents areable to autonomously migrate from one node to another across the network, transferring their code and data, which allows them to efficiently perform computations, gather information and accomplish tasks. However, despite its significant benefits, this paradigm still suffering from some limitations that obstruct its expansion, primarily in the area of security. According to the current efforts to investigate the security of mobile agents, two categories of threats are considered. The first one concerns the attacks carried out on the mobile agent during its travel or stay by malicious hosts or entities, while the second one deals the attacks performed by a malicious mobile agent in order to affect the hosting platform and consume its resources. Thus, it is substantially needed to conceive a complete security infrastructure for mobile agent systems, which includes methodology, techniques and validation. The aim of this thesis is to propose approaches which provide this technology with security features, that meet with its overall structure without compromising its mobility, interoperbility and autonomy capabilities. Our first approach was based on XML serialization and cryptographic primitives, in order to ensure a persistent mobility of agent as well as a secure communication with hosting platforms. In the second approach, we have conceived an alternative to the first approach using binary serialization and Identity-based cryptography. Our third approach was proposed to introduce anonymity aspect to the mobile agent, and provide him with a tracing mechanism to detect intrusions along its trip. The fourth approach was developed in order to restrict the access to the resources of the agent platform, using a well-defined access control policy based on threshold cryptography. At this stage, we find it interesting to experiment the utility of mobile agents with security features in preserving the security of other technologies such as cloud computing. Thus, we have developed an innovative cloud architecture using mobile agents endowed with cryptographic traces for intrusion detection and a revocation protocol based on trust threshold for prevention
Loulou-Aloulou, Monia. "Approche formelle pour la spécification, la vérification et le déploiement des politiques de sécurité dynamiques dans les systèmes à base d’agents mobiles." Thesis, Bordeaux 1, 2010. http://www.theses.fr/2010BOR14088/document.
Full textWe develop two complementary aspects related to the security of mobile agent systems: the static and dynamic aspect. The first is related to the specification of security policies which treats the various security concerns in mobile agent systems and covers the various concepts related to the modeling of such systems. The dynamic aspect takes an interest to define a set of elementary operations which may change a given policy and a framework that expresses the adaptability of the agent policy to the security requirements of the new visited system. All Specifications are coded in Z notation.Another main contribution consists in providing a formal verification framework which gives more completeness and more consistency to the proposed specifications for both aspects. All checking processes are implemented under the Z/EVES theorem prover. Finally, we have take advantage from this theoretical work and we have defined an operational framework for enforcement security policies which combine the strengths of AOP with those of formal methods
Bauvet, Sébastien. "L'emploi de l'insécurité : fonctions sociales et expériences professionnelles des travailleurs de la sécurité privée en France." Paris, EHESS, 2015. http://www.theses.fr/2015EHES0085.
Full textFocusing on the joint analysis of security trends and the casualization of labor and employment, this thesis studies an increasingly visible but yet still little known professional group: private security workers. In exploring the symbolic and material construction of the group, it shows a paradox between rising power of the sector and the lack of recognition of employees. This is explained by the poor public perception of this type of position, and the consequences of outsourcing to maximize the economic and social benefit for employers and contractors to the detriment of job security and the valorization of the work of employees. There is also evidence that recruitment is essentially based on default orientation and the urgency of securing work. The prior experience of social ruptures and the conditions of "social insecurity" here feed a disposition to accept great responsibilities and to face "civil insecurity" : this is an essential aspect of the meaning of working in insecurity. Recruiting in the vulnerable categories of society (in terms of social and/or ethno-national background), the group does not tend to form workers' collectives. The struggle against uncertainty and the search for recognition occurs at the margins of the security ideology, through the mobilization of resources acquired in previous employment or education. Thus, the plasticity of the manner in which the private security workers' group handles its functions corresponds to the implicit features of the intensification of societies of control
El, Hachem Jamal. "A Model Driven Method to Design and Analyze Secure System-of-Systems Architectures : Application to Predict Cascading Attacks in Smart Buildings." Thesis, Pau, 2017. http://www.theses.fr/2017PAUU3026/document.
Full textSystems-of-Systems (SoS) is becoming one of the major paradigm forengineering next generation solutions such as smart cities, smart buildings, health-care, emergencyresponse and defense. Therefore, there is a growing interest in SoS, their architecture and speciallytheir security. However, SoS differentiating characteristics, such as emergent behavior andmanagerial and operational independence of its constituents, may introduce specific issues thatmake their security modeling, simulation and analysis a critical challenge. In this thesis we investigatehow Software Engineering approaches can be extended to model and analyze secure SoS solutionsfor discovering high impact attacks (cascading attacks) at the architecture stage. In order to achieveour objective, we propose a Model Driven Engineering method, Systems-of-Systems Security(SoSSec), that comprises: (1) a modeling description language (SoSSecML) for secure SoS modelingand an extension of Multi-Agent Systems (MAS) for secure SoS architecture analysis, (2) thecorresponding tools: a graphical editor, a code generator, an extension of the Java AgentDevelopment (JADE) MAS simulation framework, a custom logging tool, (3) an utilization process toguide the use of the SoSSec method. To illustrate our approach we conducted a case study on a reallifesmart building SoS, the Adelaide University Health and Medical School (AHMS)
Yaich, Mohamed Reda. "Adaptiveness and Social-Compliance in Trust Management - A Multi-Agent Based approach." Thesis, Saint-Etienne, EMSE, 2013. http://www.theses.fr/2013EMSE0717/document.
Full textVirtual communities (VCs) are socio-technical systems wherein distributed individuals (human and/or artificial) are grouped together around common objectives and goals. In such systems, participants are massively collaborating with each other’s by sharing their private resources and knowledge. A collaboration always bears the risk that one partner exhibits uncooperative or malicious behaviour. Thus, trust is a critical issue for the success of such systems. The work presented in this dissertation addresses the problem of trust management in open and decentralised virtual communities (VCs). To address this problem, we proposed an Adaptive and Socially-Compliant Trust Management System (ASC-TMS). The novelty of ASC-TMS lies in its ability to exhibit social-awareness and context-awareness features. Social-awareness refers to the ability of the trust management system (TMS) to handle the social nature of VCs by making trust evaluations that are collectively harmful, while context-awareness refers to the ability of the system to handle the dynamic nature of VCs by making trust evaluations that are always in adequacy with the context in which these evaluations are undertaken. Thus, the contributions made in this thesis constitute an additional step towards the automation of trust assessment. We provided accordingly a novel trust management system that assists members of open and decentralised virtual communities in their trust decisions. The system has been implemented and deployed using the JaCaMo multi-agent platform. We illustrated also the applicability of on a real life open innovation virtual community scenario. Finally, the ASC-TMS has been experimentally evaluated using the multi-agent based Repast simulation platform. The preliminary results show that the use of our system significantly improves the stability of the virtual communities in which it has been deployed
Velay, Maxime. "Méthodes d’optimisation distribuée pour l’exploitation sécurisée des réseaux électriques interconnectés." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT063/document.
Full textOur societies are more dependent on electricity than ever, thus any disturbance in the power transmission and delivery has major economic and social impact. The reliability and security of power systems are then crucial to keep, for power system operators, in addition to minimizing the system operating cost. Moreover, transmission systems are interconnected to decrease the cost of operation and improve the system security. One of the main challenges for transmission system operators is therefore to coordinate with interconnected power systems, which raises scalability, interoperability and privacy issues. Hence, this thesis is concerned with how TSOs can operate their networks in a decentralized way but coordinating their operation with other neighboring TSOs to find a cost-effective scheduling that is globally secure.The main focus of this thesis is the security of power systems, this is why the evolution of the main characteristics of the blackouts that are failures in power system security, of the period 2005-2016 is studied. The approach consists in determining what the major characteristics of the incidents of the past 10 years are, to identify what should be taken into account to mitigate the risk of incidents. The evolution have been studied and compared with the characteristics of the blackouts before 2005. The study focuses on the pre-conditions that led to those blackouts and on the cascades, and especially the role of the cascade speed. Some important features are extracted and later integrated in our work.An algorithm that solve the preventive Security Constrained Optimal Power Flow (SCOPF) problem in a fully distributed manner, is thus developed. The preventive SCOPF problem consists in adding constraints that ensure that, after the loss of any major device of the system, the new steady-state reached, as a result of the primary frequency control, does not violate any constraint. The developed algorithm uses a fine-grained decomposition and is implemented under the multi-agent system paradigm based on two categories of agents: devices and buses. The agents are coordinated with the Alternating Direction method of multipliers in conjunction with a consensus problem. This decomposition provides the autonomy and privacy to the different actors of the system and the fine-grained decomposition allows to take the most of the decomposition and provides a good scalability regarding the size of the problem. This algorithm also have the advantage of being robust to any disturbance of the system, including the separation of the system into regions.Then, to account for the uncertainty of production brought by wind farms forecast error, a two-step distributed approach is developed to solve the Chance-Constrained Optimal Power Flow problem, in a fully distributed manner. The wind farms forecast errors are modeled by independent Gaussian distributions and the mismatches with the initials are assumed to be compensated by the primary frequency response of generators. The first step of this algorithm aims at determining the sensitivity factors of the system, needed to formulate the problem. The results of this first step are inputs of the second step that is the CCOPF. An extension of this formulation provides more flexibility to the problem and consists in including the possibility to curtail the wind farms. This algorithm relies on the same fine-grained decomposition where the agents are again coordinated by the ADMM and a consensus problem. In conclusion, this two-step algorithm ensures the privacy and autonomy of the different system actors and it is de facto parallel and adapted to high performance platforms
Egger, Clara. "ONG : Organisations néo-gouvernementales : analyse des stratégies étatiques de contrôle des ONG humanitaires en zone de conflit : (1989-2005)." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAH032.
Full textThis thesis examines how States control their humanitarian NGOs. NGOs may sometimes enjoya great room of manoeuver in the implementation of their mandate, whereas, in othercircumstances, they act as sub-contractors of their home States’ foreign policies. This researchaims to identify the factors leading them to opt for one or the other course of action, as well as themodalities of States’ control (coordination or laundering). We explain why, at the end of the ColdWar, States have increased their commitments in humanitarian action, firstly bilaterally and then,multilaterally. Drawing upon the analysis of the international humanitarian policy between 1989and 2005, we reveal a 5-phases causal process which explain why States delegate competencies toan international agent when faced with the failures of their unilateral strategies. The results showthat States fund humanitarian aid in a strategic way, aligned with their geographic and politicalpreferences. Humanitarianism enables them to support their former colonies, to contribute toanti-terrorism policies, and to back military interventions. States’ funding mostly benefit to NGOthat depend on their home States. NGO thus become neo-governmental organizations. Theseagencies experience a greater rate of rejection of their action in conflict zones that NGOs thatrefuse to rely on public funding. Faced with the failure of their unilateral control strategies,European interventionist States delegate the management of the humanitarian policy to an agent,ECHO, who mandate is to make the State control of NGOs less visible. This situation raisesmultiple-agency problems: the agent slips because of its strong permeability to its sub-contractors.The principal react by reinforcing the control of its agent. At the end of the day, the humanitarianpolicy builds on a fragile equilibrium in which each State strives to control is while knowing thata too visible control decrease the efficacy of such policy, which precisely lies on its neutrality
Books on the topic "Agent de sécurité"
Canada, Canada Foreign Affairs. Peace-keeping : agreement between the Government of Canada and the Office of the United Nations High Commissioner for Refugees for the purpose of deploying two Royal Canadian Mounted Police officers to the Republic of Guinea, Geneva July 1, 2003, in force July 1, 2003 =: Maintien de la paix : accord entre le gouvernement du Canada et le Haut Commissariat des Nations Unies pour les réfugiés ayant pour but de déployer deux agents de la Gendarmerie royale du Canada en République de Guinée, Genève, le 1 juillet 2003, en vigueur le 1er juillet 2003. Ottawa, Ont: Minister of Public Works and Government Services Canada = Ministre des travaux publics et services gouvernementaux Canada, 2003.
Find full textDenaud, Patrick, and Luc Delasnerie. Le silence vous gardera : Journaliste et agent secret. Editions Les Arènes, 2013.
Find full text(Producer), WHO, ed. Flame Retardants: Tris(chloropropyl) Phosphate and Tris (2-chloroethyl) Phosphate: Environmental Health Criteria Series No. 209 (Environmental Health Criteria Series). World Health Organisation, 1999.
Find full textBook chapters on the topic "Agent de sécurité"
PICCARDI, Jeanne. "Comme des éphémères dans la lumière." In Revue Education, Santé, Sociétés, Vol. 7, No. 2, 19–42. Editions des archives contemporaines, 2021. http://dx.doi.org/10.17184/eac.4664.
Full textAMRAOUI, Asma, and Badr BENMAMMAR. "Optimisation des réseaux à l’aide des techniques de l’intelligence artificielle." In Gestion et contrôle intelligents des réseaux, 71–94. ISTE Group, 2020. http://dx.doi.org/10.51926/iste.9008.ch3.
Full textLeroux, Nathalie. "4. Un métier en clair-obscur : les agents de sécurité du métropolitain." In La révolution des métiers, 99. Presses Universitaires de France, 2002. http://dx.doi.org/10.3917/puf.piote.2002.01.0099.
Full text