Dissertations / Theses on the topic 'Sécurité, Services privés de'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Sécurité, Services privés de.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Mafo, Fonkoue Edith. "Les sociétés militaires et de sécurité privées et la sécurité internationale." Nice, 2012. http://www.theses.fr/2012NICE0004.
Full textAkadjé, Ahiouré Mathieu. "Sécurité publique et sécurité privée en Côte d'Ivoire." Toulouse 1, 2003. http://www.theses.fr/2003TOU10007.
Full textOver the past few years, Côte d'Ivoire, as other African countries, has known a significant increase in its crime rate. This has contributed to the development of a growing feeling of insecurity among the population. The police and public authorities are unable to contain and control the situation. As a result, recourse to private security services became a substitute for Governement security and over. This trend led to the reativation (or rebirth) of traditional practices which fall out of Government autorities control. As well did it lead to a boom in the trade market, which people now have to try their best of regulate, which a serious question arises, and that is the question of the Government's ability to guarantee for its people both security and enforcement of property rights
Chazareix, Anne. "L'Etat et le secteur privé de la sécurité : vers la mise en cause du monopole de la fonction régalienne de sécurité." Nice, 2002. http://www.theses.fr/2002NICE0054.
Full textAl, Mesaferi Saif. "Le contrat de sécurité privée en droit français et émirati." Thesis, Paris 1, 2018. http://www.theses.fr/2018PA01D014.
Full textThe issue of private security is a hot topic. This rapidly expanding sector has been the subject of regulations in recent decades. Its peculiarity lies in the privatization of a sovereign domain reserved for state intervention. Private security then poses the problem of processing the security mission. We note that the private sector is investing more and more in the field of security while differentiating itself from the public sector. The participation of the private sector is done by contract which obeys most of its aspects in common law
Guérin, Rémy. "Police, sécurité, modernité." Paris 8, 1992. http://www.theses.fr/1992PA080649.
Full textThis is a theoretical and practica study of the police. Are studied the concept of security, in text, ist field and for the citzen - an attempt ar definitionn, its linguistic evolution, the judicial protection against threasts to security and the premanence of violence through the ages. - the framexork of the rule of law on security - the concept of domestic security - the passage from the idea of public order to a security ideology services charged with the security of citizens, national services (gnedarmerie, national police, civil protection) - other services (municipal police, private policing) - the developement of the idea of private security and the french market in this area - the concept of the word "police" and its history - an analyse of different thesis pertaining to doctrine and law governing the distinction between administrative and judicial missions of policing - a proposition for a new criteria of distinction, the alternative criteria - the mission of the police, both in periods of un-rest and calm, administrativally, judicially and the notion of national defence in regards counter-espionage - relations with the judiciary and connecting the judicial police to the ministry of justice (avantages and disavantages) - the structures of the police, administrative and professional, that is to say, recrutement, training and unionism modernization policies of policing sinc 1981
Parodi, Florence. "Les sociétés militaires et de sécurité privées en droit international et droit comparé." Paris 1, 2009. http://www.theses.fr/2009PA010321.
Full textLe, Saux Nicolas. "Privatisation des activités de sécurité privée et de défense : la fin des Etats ?" Thesis, Nice, 2014. http://www.theses.fr/2014NICE0022.
Full textOver the last two centuries, economic and democratic development has been closely linked to the consolidation of the Statemonopoly on legitimate violence. If the private sector has long been confined to the margins of security issues, the landscape has been considerably modified over the last two decades. Many industrial countries have now more private security officers than public law enforcement resources. In 2008, in Irak there were more private security contractors than US soldiers. Following mutation towards State control, the development of democracy, the rise of international safeguards such as UNO or EU, combined with the globalisation of a liberal economic model, appear to facilitate a move back towards the privatisation of security and defence activities. Mirroring the fall of the Roman Empire, is the increasing use of private security and military forces by the modern State a forewarning of its own demise? Are modern States “moving back to the future” and private interests overwhelming the general good? In a global liberal economic order, can France maintain its hold on security and defence when its fiduciary powers, and soon may be its fiscal ones as well, are controlled by Europe? Using an historical and comparative approach, this research is organised around the analysis and an attempt to answer the following question: are security and defence activities similar to any others or do they require a special treatment?
Paulin, Cédric. "Vers une politique publique de la sécurité privée?Réguler la sécurité privée (1983-2014)." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLV077/document.
Full textThe creation, in 2011-2012, of the National Council for Private Security Activities (CNAPS), a new parastatal agency in charge of regulating and controlling regulated private security, was perceived by professionals in the sector and By public and even political authorities ("the sector revolution thirty years after the 1983 Act"), as a fundamental reform for all the problems of the private security sector.Associated with the creation of the Interministerial Delegation for Private Security (DISP) in 2010, which became the Delegation for Security Cooperation in 2014, the question of the meaning and scope of these administrative developments arises: why and how the State managed to set up a new law enforcement for private security? How to describe and characterize this “law enforcement”? Which is its nature and what are the first results?The translation register, in a cognitive approach to public policy, will be a useful theoretical tool to understand the modalities of progress of these reforms.Is this reform, which takes place 30 years after the first law of 12 July 1983, the so-called founder in the field of private security, a distant endorsement? It needs to re-examine, after first constructing them, the two terms of the articulation between the State and private security, namely the public control of private security and public / private co-production of security up to raise the question of the existence of a public policy on private security.A prologue defining the place of the researcher in the object of study and an epilogue emerging from the chronology of the object (post-2014) contextualize a little more broadly, finally, this sociological analysis of public action
Gandaho, Tchéouénou Patient. "La mise sous surveillance du "client roi" : analyse sociologique des dispositifs et pratiques d'encadrement des clients-usagers dans les centres commerciaux." Thesis, Evry-Val d'Essonne, 2010. http://www.theses.fr/2010EVRY0003.
Full textIn the second half of the twentieth century, the development of agencies of private security has significantly increased. These organizations have become the main part of a flourishing market qualified rightly or wrongly as ‘’market of fear’’. From that fact but also for the significant increase in expenditure and equipment involved in the private security activities, the research aims at questioning the reasons and describing the forms from the labour sociology’s perspective. The main fieldwork of the research is the supermarket. Based on the work of Michel Foucault, this PhD thesis deconstructs the presupposed features between public and private security that was in fashion during the past decades, showing the similarities of these two types of security. The hypothesis is that surveillance activity seems to be a new way for the management of the distance between social classes in a context where geographic barriers are becoming less visible. From then on, the staff is trained on the job, referring to a spectrum of suspicious persons and attitudes, based on their personal experiences. Moreover, the thesis reviews the professional identity of these security workers, who are mostly immigrants. This ‘’ethnicization’’ finds its roots in a silent compromise between the immigrants who are aware of their social, economic and administrative situation and the (private) employers who want to take profit from this ‘’docile’’ manpower
Leroux, Nathalie. "Les agents de sécurité à la RATP : groupe, catégorie professionnelle ou métier ?" Paris 1, 1997. http://www.theses.fr/1997PA010679.
Full textHow does a professional group build up along an activity such as security, which appears to be most difficult to objectivize? Parti examines the history of the professional group between 1945 and 1995. It shows how, at the RATP, the legal environment organises the division of security labour while letting room for incertainty. It brings to light concomitant developments between some factors on the one hand (insecurity phenomena, company politicies and national security politicies) and, on the other hand, the joint definition of the function and structure of security at the RATP. Part II studies how, between 1945 and 1988, the group has been building up along an invisible activity (since security agents are in plain-clothes), while analysing security activities and their meaning for agents, we show how, within the company itself, the whole group has come to form a trade as such, through a training process allowing the share of knowledge and skills among peers, and how it has shaped their identity within the organisational and professional system to which they belong. Part III presents the wilful construction of a professional grade within the organisation and of an "institutionalized trade" defined outside the firm (1989-1995). We observe the creation of a new group, now in uniform, which represents a security function then defined as strategic for the firm. A phase of innovation gives place to a phase when a professional grade as such is being established within the firm. Both groups join into a common entity and new rules are set up to redefine the groups positioning. At the same time, principles of recognition, which are external to the firm (diploma), are being established. Eventually, the previous principles of recognition of both groups do not easily match with the new institutional recognition of this professional grade and of this trade
Bauvet, Sébastien. "L'emploi de l'insécurité : fonctions sociales et expériences professionnelles des travailleurs de la sécurité privée en France." Paris, EHESS, 2015. http://www.theses.fr/2015EHES0085.
Full textFocusing on the joint analysis of security trends and the casualization of labor and employment, this thesis studies an increasingly visible but yet still little known professional group: private security workers. In exploring the symbolic and material construction of the group, it shows a paradox between rising power of the sector and the lack of recognition of employees. This is explained by the poor public perception of this type of position, and the consequences of outsourcing to maximize the economic and social benefit for employers and contractors to the detriment of job security and the valorization of the work of employees. There is also evidence that recruitment is essentially based on default orientation and the urgency of securing work. The prior experience of social ruptures and the conditions of "social insecurity" here feed a disposition to accept great responsibilities and to face "civil insecurity" : this is an essential aspect of the meaning of working in insecurity. Recruiting in the vulnerable categories of society (in terms of social and/or ethno-national background), the group does not tend to form workers' collectives. The struggle against uncertainty and the search for recognition occurs at the margins of the security ideology, through the mobilization of resources acquired in previous employment or education. Thus, the plasticity of the manner in which the private security workers' group handles its functions corresponds to the implicit features of the intensification of societies of control
Vindevogel, Franck. "Sécurité publique et initiative privée : un partenariat pour le maintien de l'ordre à New York." Paris 8, 2002. http://www.theses.fr/2002PA082136.
Full textIn America's big cities, police forces no longer have a monopoly on public safety. Since the 1960's and 1970's, residents, businesses and property owners in countless neighborhoods have joined forces to reduce crime, disorder and fear in the streets. Based on sources gathered in New York City, this research work aims at analysing the roots of this mobilization and evaluate its positive potential. If today's community involvement shares many common features with the historical tradition of vigilantism, it also substantially departs from it: because they seek to complement rather than replace police action, neighborhood organizations are repectful of democratic principles. Most police precincts, by the way, no longer view community responses to crime as illegitimate and examples of coproduction have recently multiplied. The impact of collective action appears to be mixed though: if volunteer citizens and private security officers have contributed to reduce disorders, street drug trafficking and improve people's perceptions of New York City's streets, efforts are not likely to produce the same results everywhere. This work highlights the key role played by block and neighborhood associations in crime prevention and order maintenance, evaluates the changing mentalities within police organizations and finally reveals how the frontier between the seemingly opposed concepts of " private security " and " public safety " is increasingly becoming blurred
Oulmakhzoune, Said. "Enforcement of Privacy Preferences in Data Services: A SPARQL Query Rewriting Approach." Télécom Bretagne, 2013. http://www.telecom-bretagne.eu/publications/publication.php?idpublication=133858.
Full textWith the constant proliferation of information systems around the globe, the need for decentralized and scalable data sharing mechanisms has become a major factor of integration in a wide range of applications. Literature on information integration across autonomous entities has tacitly assumed that the data of each party can be revealed and shared to other parties. A lot of research, concerning the management of heterogeneous sources and database integration, has been proposed, for example based on centralized or distributed mediators that control access to data managed by different parties. On the other hand, real life data sharing scenarios in many application domains like healthcare, e-commerce market, e-government show that data integration and sharing are often hampered by legitimate and widespread data privacy and security concerns. Thus, protecting the individual data may be a prerequisite for organizations to share their data in open environments such as Internet. Work undertaken in this thesis aims to ensure security and privacy requirements of software systems, which take the form of web services, using query rewriting principles. The user query (SPARQL query) is rewritten in such a way that only authorized data are returned with respect to some confidentiality and privacy preferences policy. Moreover, the rewriting algorithm is instrumented by an access control model (OrBAC) for confidentiality constraints and a privacy-aware model (PrivOrBAC) for privacy constraints. A secure and privacy-preserving execution model for data services is then defined. Our model exploits the services¿ semantics to allow service providers to enforce locally their privacy and security policies without changing the implementation of their data services i. E. , data services are considered as black boxes. We integrate our model to the architecture of Axis 2. 0 and evaluate its efficiency in the healthcare application domain
Aït, Youssef Driss. "Sécutrité privée et libertés." Thesis, Nice, 2015. http://www.theses.fr/2015NICE0034/document.
Full textThe economic growth of the private security sector has been relatively important during the 70s. This rapid but uncontrolled development has however generated important problems implicating private security personnel. In order to respond to these problems, the legislator was forced to regulate the sector through the law of July 12th 1983. Thirty years later, the 1983 law remains the sector’s rules of reference. Today, threats on modern societies have evolved and become more violent. Furthermore, due to a lack of economic resources, public authorities have reduced the range of security mission they’ll undertake to focus solely on high priority issues. As a consequence, new responsibilities have been transferred to private security actors. In this context, the safeguard of individual liberties appears has an important topic. For example, private security agents operating at airports have been granted rights (body check and luggage searches) that interfere with people’s freedom. To regulate the sector’s development, the legislator has created a structure to control these activities. Despite this effort, regulations remains insufficient especially has more missions are transferred by the State to private security actors. As a result, reinforcing training programs for these private actors constitute an important step towards maintaining people’s rights. It is the reason behind the Legislator decision to include training programs in book VI of domestic security laws. Today, private security actors participate actively in domestic security missions alongside public security forces while respecting individual liberties
Kimbembe-Lemba, Aymar. "Le statut des salariés des sociétés militaires privés participant aux conflits armés." Thesis, Poitiers, 2012. http://www.theses.fr/2012POIT3012.
Full textA distinction is made between civilians and military personnel. This distinction is implicit in the substantive issue of this study on determining the legal status of employees of private military companies (PMCs) involved in armed conflicts. Moreover, the defense and State security are provided by various actors of different statuses that have defined roles for a legal framework. Civilians and members of the armed forces are indeed links in this chain. The distinction mentioned over is not confined there, but it is also about the only members of the armed forces because there is a distinction between internal and one external. All members of the armed forces are not entitled to combatant status. However, the denial of combatant status to certain military is only relative and does not affect their right to prisoner of war status. These soldiers are different from those employed outside the armed forces and mandated by their employer to provide benefits to the armies in a theater of operations. This use raises several issues in IHL. PMCs provide services that go from logistics to direct participation in hostilities. This direct or indirect participation in hostilities leads to a “hemorrhage of language” to describe employees of PMCs as mercenaries, new mercenaries, defense and security contractors, soldiers for sale, irregular combatants, etc. Thus, the employees of these companies undertake specific activities of mercenaries? Their companies-employers do they constitute relief societies ? Are they combatants, noncombatants or irregular combatants ? This is so prompt questions that this thesis attempts to answer
Arroyo, Antonio. "Professionnalisation et développement professionnel : cas des agents de sécurité privée de la branche surveillance humaine en France." Thesis, Normandie, 2017. http://www.theses.fr/2017NORMR088.
Full textThis academic research task focuses on the tension between the institutional discourse on the professionalization of private security in France and on the learning and practice process of the profession by security agents. Different factors point to the issue of the institutional project of the professionalization and of the training systems. The researcher brings to light, with a qualitative and multidimentional approach, the institutional intentions and the gap between the displayed speech and reality. In the field, the security agents feel uncomfortable at the beginning of their profession, when they understand what their profession truly is. To fulfill the objectives of the contract, they build an informal standard risk of acceptance, the key-driver of the training process. The action thus developed allows the security agents to learn in the course of their activity. The swift evolution of institutional expectancies in security matters transforms the operators and calls them in a new relation to action. The answers given require a global approach to risk prevention and management on sites and territories (mostly with the public attending). A new concept of coproduction of private and public security is born and the institutional discourse then changes in appearance, but the operational reality remains ill-adjusted
Barnier, Louis-Marie. "Entre service public et service privé : la valorisation du travail dans le transport aérien." Paris 10, 2005. http://www.theses.fr/2005PA100091.
Full textThe French air deregulation, since 1987, with the privatisation policy, disrupt the work context in this sector. The different parts of air labour studied here – air attendants, ground handling, check-in, pilots – decline work in common configuration, the “global figure always changing” from N. Elias. The working act is writing as a contradictory fact between the both paradigms, profitability and public service. The ambivalent nature of the work's bureaucratic normalization make theatre of stakes. The same problem occur with redefines of cooperation between professional groups and air technical paradigm, The improvement of value and of the image of work in the imaginary representation, consists for the salaried in defending, in the imposed profitability context, the public service dimension, especially air safety
Brevet, David. "Conception de services pour la mobilité urbaine respectueux des données privées et assurant la sécurité des clients et des véhicules." Thesis, Université Clermont Auvergne (2017-2020), 2019. http://www.theses.fr/2019CLFAC069.
Full textThis manuscript addresses the Dial-A-Ride Problem (DARP) using Private Vehicles and Alternative Nodes (DARP-PV-AN). The DARP consists of creating vehicle routes in order to ensure a set of users’ transportation requests. Each request corresponds to a client needing to be transported from his/her origin to his/her destination. Routing costs have to be minimized while respecting a set of constraints like time windows and maximum route length.In the classical DARP, vehicles have to start from a depot and come back to it at the end of their route. In the DARP-PV-AN, the on-demand transportation service can be done either by a public fleet or by clients that use their private vehicles. The use of these vehicles adds more flexibility and unclog the public transportation fleet by allowing clients to organize their own transportation. However, it also raises some privacy concerns. The DARP-PV-AN addresses these concerns and focuses on location privacy, i.e. the ability to prevent third parties from learning clients’ locations, by keeping both original and final location private. This is addressed by setting several pickup/delivery nodes for the transportation requests, thus masking the private address.The DARP-PV-AN is first solved in a mono-objective context. A compact mixed integer linear model is presented and an Evolutionary Local Search (ELS) is proposed to compute solutions of good quality for the problem. These methods are benchmarked on a modified set of benchmark instances. A new set of realistic instances is also provided to test the ELS in a more realistic way. A second approach solving the mono-objective DARP-PV-AN is proposed. Based on a hybrid metaheuristic, it combines three methods: a genetic algorithm, a Branch and Bound method, and Integer Linear Programming (ILP) to solve the Weighted Set Cover Problem (WSCP). This approach is tested on the new instances and compared to the previously proposed ELS.This hybrid method is then tuned to solve the DARP-PV-AN in a bi-objective context. In order to do this, the multi-objective algorithm NSGA-II is used, always associated with a Branch and Bound method and bi-objective WSCP solving by ILP (Integer Linear Programming). For the bi-objective WSCP resolution, different aggregation methods were tested and compared. This approach is also tested on the new instances, modified to treat them in a bi-objective framework
Bresson, Jonathan. "Le conflit, du face-à-face au corps à corps : une immersion comme agent de sécurité en établissements de nuit." Thesis, Rennes 2, 2018. http://www.theses.fr/2018REN20019.
Full textNightclub security officer’s daily job is punctuated by physical violence. Their roles as bouncer and doorman aim to prevent, track down and manage conflicts. Their professional activity is structured around the perspective of physical brutality and the risk of the occurrence of tragic events. The field work of this original research consists of the observation and analyze of conflicts: the face to face and hand to hand, excluding intimate violence and lynching. Violence in night spots constitue a worldwide criminological problem. However, it remains absent from French researches. Bodily immersion and observations by enactment ethnography are appropriate ways to study legally risky and mythologizing situations. E. Goffman’s sociology is an interesting starting point to analyze the conservation and the rupture of frames, swinging between the situation and the situated social performances. The study shows that the face to face conflict follows a graduated process: from clash to brawl, threw fight, being an interaction ritual. This disorder element, that sometimes seems confused, has its origins anchored in the violence culture which it structures in return. Conflict stays organized and is an organization element of the social order. Having an understanding of it brings back to the notion of physical brutality and questions the threshold of thedefinition of “violence”, the feeling of aggression and the “acting out” in a situationist and processual research dynamic in which moves, gestures and movement themselves become key elements
Barbier, Arnaud. "Les activités privées de sécurité à l'épreuve du droit public français : contribution à l'étude des mutations de la police administrative." Thesis, Sorbonne Paris Cité, 2018. http://www.theses.fr/2018USPCD031.
Full textServices provided by private security firms aim to protect individuals and property and are governed by a specific and relatively recent legal system. In theory, this type of commercial activity should solely be bound by private contract law, without any access to the power afforded by the public sector. Various types of internal security have been recently institutionalized alongside public security forces, and now assume specific conditions of access and employment. Moreover, the continual extension of their functional structure illustrates a teleological approach from those in public power to legitimize these activities and their effective participation in crime fighting. In this case, should we still consider public security out of merchandisation ? Nevertheless, the practical usage of private security is bound by one compelling and limiting principle, stating that private individuals cannot execute public law enforcement missions. Though professional private security firms do not explicitly replace the public police force, they fulfill a mission of social peace that calls into question the fundamental theories pertaining to the role of public authority in the matter of social peace. It would seem that private security’s logic of action would cause a conceptual confrontation between individual liberty and private actions on the one hand, and the notion of public order, police authority and public interest on the other hand. The validity of this contemporary logic stresses the need to redefine the classic tools of French public law as it relates to legitimizing current means of action in relation to the protection of social order. The notion of police is at stake, but maybe this could be considered as an opportunity to reessentialize it. But the problematic issue of general security is, at this point, so complex, that in order to fairly examine the issue, it is has become mandatory to evaluate it within a metalegal phenomenological format in which a jurist can be expected to clarify the distinctive nature of the public versus private domain
Bentounsi, Mohamed el Mehdi. "Les processus métiers en tant que services - BPaaS : sécurisation des données et des services." Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCB156/document.
Full textCloud computing has become one of the fastest growing segments of the IT industry. In such open distributed computing environments, security is of paramount concern. This thesis aims at developing protocols and techniques for private and reliable outsourcing of design and compute-intensive tasks on cloud computing infrastructures. The thesis enables clients with limited processing capabilities to use the dynamic, cost-effective and powerful cloud computing resources, while having guarantees that their confidential data and services, and the results of their computations, will not be compromised by untrusted cloud service providers. The thesis contributes to the general area of cloud computing security by working in three directions. First, the design by selection is a new capability that permits the design of business processes by reusing some fragments in the cloud. For this purpose, we propose an anonymization-based protocol to secure the design of business processes by hiding the provenance of reused fragments. Second, we study two di_erent cases of fragments' sharing : biometric authentication and complex event processing. For this purpose, we propose techniques where the client would only do work which is linear in the size of its inputs, and the cloud bears all of the super-linear computational burden. Moreover, the cloud computational burden would have the same time complexity as the best known solution to the problem being outsourced. This prevents achieving secure outsourcing by placing a huge additional overhead on the cloud servers. This thesis has been carried out in Université Paris Descartes (LIPADE - diNo research group) and in collaboration with SOMONE under a Cifre contract. The convergence of the research fields of those teams led to the development of this manuscrit
El, jaouhari Saad. "A secure design of WoT services for smart cities." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0120/document.
Full textThe richness and the versatility of WebRTC, a new peer-to-peer, real-time and browser based communication technology, allowed the imagination of new and innovative services. In this thesis, we analyzed the capabilities required to allow a participant in a WebRTC session to access the smart Things belonging to his own environment as well as those of any other participant in the same session. The access to such environment, which we call “SmartSpace (SS)”, can be either passive, for example by monitoring the contextual information provided by the sensors, or active by requesting the execution of commands by the actuators, or a mixture of both. This approach deserves attention because it allows solving in an original way various issues such as allowing experts to remotely exercise and provide their expertise and/or knowing how. From a technical point of view the issue is not trivial because it requires a smooth and mastered articulation between two different technologies: WebRTC and the Internet of Things (IoT) /Web of Things (WoT). Hence, the first part of the problem studied in this thesis, consists in analyzing the possibilities of extending WebRTC capabilities with theWoT. So as to provide a secure and privacy-respectful access to the various smart objects located in the immediate environment of a participant to any otherend-user involved in the same ongoing WebRTC session. This approach is then illustrated in the ehealth domain and tested in a real smart home (a typical example of a smart space). Moreover,positioning our approach in the context of communication services operating in smart cities requires the ability to support a multiplicity of SSs,each with its own network and security policy. Hence,in order to allow a participant to access one of his own SSs or one of another participant (through a delegation of access process), it becomes necessary to dynamically identify, select, deploy, and enforce the SS’s specific routing and security rules, so as to have an effective, fast and secure access. Therefore, the second part of the problem studied in this Ph.D.consists in defining an efficient management of the routing and security issues regarding the possibility of having multiple SSs distributed over the entire network
Bentounsi, Mohamed el Mehdi. "Les processus métiers en tant que services - BPaaS : sécurisation des données et des services." Electronic Thesis or Diss., Sorbonne Paris Cité, 2015. https://wo.app.u-paris.fr/cgi-bin/WebObjects/TheseWeb.woa/wa/show?t=1698&f=9066.
Full textCloud computing has become one of the fastest growing segments of the IT industry. In such open distributed computing environments, security is of paramount concern. This thesis aims at developing protocols and techniques for private and reliable outsourcing of design and compute-intensive tasks on cloud computing infrastructures. The thesis enables clients with limited processing capabilities to use the dynamic, cost-effective and powerful cloud computing resources, while having guarantees that their confidential data and services, and the results of their computations, will not be compromised by untrusted cloud service providers. The thesis contributes to the general area of cloud computing security by working in three directions. First, the design by selection is a new capability that permits the design of business processes by reusing some fragments in the cloud. For this purpose, we propose an anonymization-based protocol to secure the design of business processes by hiding the provenance of reused fragments. Second, we study two di_erent cases of fragments' sharing : biometric authentication and complex event processing. For this purpose, we propose techniques where the client would only do work which is linear in the size of its inputs, and the cloud bears all of the super-linear computational burden. Moreover, the cloud computational burden would have the same time complexity as the best known solution to the problem being outsourced. This prevents achieving secure outsourcing by placing a huge additional overhead on the cloud servers. This thesis has been carried out in Université Paris Descartes (LIPADE - diNo research group) and in collaboration with SOMONE under a Cifre contract. The convergence of the research fields of those teams led to the development of this manuscrit
Carrière, Damien. "Filtering class through space : security guards and urban territories in Delhi, India." Thesis, Sorbonne Paris Cité, 2018. http://www.theses.fr/2018USPCC026/document.
Full textSecurity guards have become a fixture of a city like Delhi. They stand on duty in every upper and middle-class neighborhood and in every mall. I ask : what are the effects of security guards on the city of Delhi. It does not appear that the criminality in Delhi would justify the recruitment and deployment of a quarter of a million men —who are not successful in stopping criminality against women. It appears that the role of security guards is to mark the territory that they keep on watch as belonging to the upper and middle-classes. The first chapter exposes in details the methodology employed for data collection. The second one proposes a “phenomenology of security guards”, that is, a close description of who they are and the work they do. Their work interrogates on the making and unmaking of public space. The third chapter pays attention to the legal framework and shows that the laws framing the work of security guards are neither coherent, neither respected. This should not be interpreted like a weakening of the state but rather like a reinforcement of the domination of middle and upper-class over the control of the city. In the fourth chapters I deploy the vocabulary of political economy to explain the role played in it by private security guardianship. I show that it participates in keeping at bay crisis by absorbing a significant surplus population. The system that permits the guards to work rests on a gendered division of labor which they contribute to reinforce by keeping Delhi’s street masculine
Charbonnier, Laurent. "Évaluation de la sécurité des réseaux privés virtuels sur MPLS." Mémoire, École de technologie supérieure, 2007. http://espace.etsmtl.ca/239/1/CHARBONNIER_Laurent.pdf.
Full textKumar, Amrit. "Titre : sécurité et protection de la vie privée pour le calcul déporté." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM093/document.
Full textHashing and hash-based data structures are ubiquitous. Apart from their role inthe design of efficient algorithms, they particularly form the core to manycritical software applications. Whether it be in authentication on theInternet, integrity/identification of files, payment using Bitcoins, webproxies, or anti-viruses, the use of hashing algorithms might only be internalbut yet very pervasive.This dissertation studies the pitfalls of employing hashing and hash-based datastructures in software applications, with a focus on their security and privacyimplications. The mainstay of this dissertation is the security and privacyanalysis of software solutions built atop Bloom filters --- a popularhash-based data structure, and Safe Browsing --- a malicious websitedetection tool developed by Google that uses hash functions. The softwaresolutions studied in this dissertation have billions of clients, which includesoftware developers and end users.For Bloom filters and their privacy, we study a novel use case, where they forman essential tool to privately query leaked databases of personal data. Whilefor security, we study Bloom filters in adversarial settings. The studyencompasses both theory and practice. From a theoretical standpoint, we defineadversary models that capture the different access privileges of an adversary onBloom filters. We put the theory into practice by identifying several securityrelated software solutions (employing Bloom filters) that are vulnerable to ourattacks. This includes: a web crawler, a web proxy, a malware filter, forensictools and an intrusion detection system. Our attacks are similar to traditionaldenial-of-service attacks capable of bringing the concerned infrastructures toknees.As for Safe Browsing, we study vulnerabilities in the architecture that anadversary can exploit. We show several attacks that can simultaneouslyincrease traffic towards both the Safe Browsing server and the client. Ourattacks are highly feasible as they essentially require inverting hash digestsof 32 bits. We also study the privacy achieved by the service by analyzing thepossibility of re-identifying websites visited by a client. Our analysis andexperimental results show that Safe Browsing can potentially be used as a toolto track specific classes of individuals.This dissertation highlights the misunderstandings related to the use of hashingand hash-based data structures in a security and privacy context. Thesemisunderstandings are the geneses of several malpractices that include the useof insecure hash functions, digest truncation among others. Motivated by ourfindings, we further explore several countermeasures to mitigate the ensuingsecurity and privacy risks
Garcette, Nicolas. "Instabilité sociale et développement." Paris, EHESS, 2008. http://www.theses.fr/2008EHES0060.
Full textThis dissertation is about crime in developing countries and its eventual links with some economical variables, income distribution in particular. Chapter I is a large literature review on crime economics. Chapter II studies the effects of income distribution and job market (participation, unemployment, underemployment, informality) on the crime rates in Argentina between 1991 and 2004. Chapter III presents a theoretical model on the relationship between income distribution and private and public protection. Chapter IV is the counterpart of Chapter II. We analyze the link between criminal victimization and income, using the crime victimisation surveys conducted annually between 1996 and 2001 in Argentina
Hops, Sylvie. "La sécurité du consommateur : prévention et répression." Paris 1, 1992. http://www.theses.fr/1992PA010283.
Full textOne can define a consumer as an individual or collectivity deriving objective and subjective satisfaction from the purshase of any given goods or services. Physically dangerous products of services would be an example of an objectively substantial insatisfaction. Preventive mesurces directed at faulty products or services are destined to improve objective satisfaction at the consumer level. Repression aims to penalise the makers of products or services which are in fact not consumable at all. Essentially, the protection of the rights of an isolated consumer (acting in his own behald before the designated judicial instances) is limited. At the same time, judicial actions undertaken by consumer associations are also limited by the french state which refuses the role of these associations as representatives of the general interest. Only the state has the right to pursue the general interest by means of its various governmental agencies. Unfortunately, these same agencies do not provide sufficient security to the consumer with respect to the general interest, although certain institutions la normalisation, le mediateur) currently show a tendancy, at least officially, to address the more severe manifestations of consumer insecurity
Chevalier, Valérie. "Défis conceptuels dans l’implantation de régulations pour contrôler les activités de contractuels privés se retrouvant en zone de guerre." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23356.
Full textDiaz, Frédéric. "Coproduction de la sécurité : un nouveau mode de contrôle et de régulation sociale : la gestion des risques dans les espaces privés lors de manifestations sportives et culturelles." Versailles-St Quentin en Yvelines, 2003. http://www.theses.fr/2003VERS018S.
Full textRotrou, Julien. "Gestion du nomadisme dans les réseaux d'accès privés : une architecture flexible de contrôle d'accès et des ressources en fonction du contexte." Paris 6, 2008. http://www.theses.fr/2008PA066508.
Full textZahoor, Ehtesham. "Gouvernance de service : aspects sécurité et données." Phd thesis, Université Nancy II, 2011. http://tel.archives-ouvertes.fr/tel-00643552.
Full textDumas, Jean-Pierre. "Les prestations de services et la sécurité des consommateurs." Montpellier 1, 1991. http://www.theses.fr/1991MON10030.
Full textBramat, Eric. "L'obligation de sécurité : produits et services mis sur le marché." Montpellier 1, 2000. http://www.theses.fr/2000MON10040.
Full textMichas-Béguerie, Sophie. "Régimes privés de retraites complémentaires : essai de comparaison des systèmes allemand, anglais et français dans une perspective communautaire." Paris 10, 1995. http://www.theses.fr/1995PA100156.
Full textThe analysis of the current private pension schemes requires a good understanding of the basic schemes. Variations in the range of benefits provided for by the public scheme indeed explain the unequal space left to private initiatives to bring extra revenue once they have ceased working. The origins of these occupational pension schemes also explain the regulations ruling the administrating institutions and the links between employers, their staff and pension funds. Various types of institutions are in charge of pension’s management. The comparisons between schemes highlight the employer's supremacy on English and German occupational pensions. In France, the analysis of a few juridical questions shows part of the nature of ties among intervening parties. The study of pension schemes clearly points out the challenges they face and their variable nature. Beyond the domestic issues, European challenges materialize and question both the current pension schemes and the future of national superannuation funds. The study of European social law as introduced by the treaty of Rome (equal treatment between men and women, free movement of workers) together with its liberal economic policy outlines the differences in both structure and philosophy of pension schemes that will impede the adoption of common orientations
Mohamed, El-Marouf Ahmed. "Mesure de distance entre politiques de sécurité dans un service Web." Master's thesis, Université Laval, 2015. http://hdl.handle.net/20.500.11794/25929.
Full textThe main contribution of this paper is to suggest a new method to measure the similarity between security policies written in XACML. This is done in two steps: first the safety policy is formalized in SPL, secondly the results will be used to measure the distance between policies. The choice of the distance to use depends on the types of predicates (categorical or numeric). Thus, a synthetic table is provided to link the different metrics that are calculated in accordance with their predicate. A prototype has been coded in PHP and implemented to validate our contribution. Recommendations were issued in conclusion to enrich the proposed approach.
Mendes, Suzan. "Sécurité des Communications Ouvertes : Vers une Infrastructure Globale pour les Services d'Authentification." Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 1995. http://tel.archives-ouvertes.fr/tel-00821147.
Full textCalife, Catherine. "La protection du consommateur en matière de sécurité des produits et services." Paris 13, 2001. http://www.theses.fr/2001PA131002.
Full textA complete consumption policy which aims at promoting consumers'interests must integrate goods as well as services. Among others French law has a specific policy which consists in warning and repressing the accidents caused by goods and services. The obligation of security must be beneficial to everybody, asit is required by public order and equity. Indeed, jurisprudence and doctrine tend to unify the mode of contactual and criminal liabilities by submitting the professionals to the same obligations towards the consumers of goods and services whether they be bound by contracts or not. The subject of this study is to try and analyse and to appreciate both aspects (prevention, repression and compensation) of the consumer protection and of the safety of goods and services. Prevention rest on a whole set of national, european or international rules which aim is to warrant the best access to goods and services and a use for consumers. .
Charavel, Marie-Hélène. "Le service des urgences de Lesparre : état des lieux, bilan d'activité, proposition d'un projet de restructuration." Bordeaux 2, 1997. http://www.theses.fr/1997BOR2M025.
Full textVincent, Johann. "Identité numérique en contexte Télécom." Phd thesis, Université de Caen, 2013. http://tel.archives-ouvertes.fr/tel-01007682.
Full textSahin, Henriette Louise. "Contribution à l'étude du réseau numérique à intégration de services : interconnexion réseau local et autocommutateur privé (PABX) au réseau numérique à intégration de services." Toulouse, INPT, 1988. http://www.theses.fr/1988INPT011H.
Full textOuedraogo, Wendpanga Francis. "Gestionnaire contextualisé de sécurité pour des « Process 2.0 »." Thesis, Lyon, INSA, 2013. http://www.theses.fr/2013ISAL0132/document.
Full textTo fit the competitive and globalized economic environment, companies and especially SMEs / SMIs are more and more involved in collaborative strategies, requiring organizational adaptation to fit this openness constraints and increase agility (i.e. the ability to adapt and fit the structural changes). While the Web 2.0 allows sharing data (images, knowledge, CV, micro-blogging, etc...) and while SOA aims at increasing service re-using rate and service interoperability, no process sharing strategies are developed. To overcome this limit, we propose to share processes as well to set a "process 2.0" framework allowing sharing activities. This will support an agile collaborative process enactment by searching and composing services depending on the required business organization and the service semantics. Coupled with the cloud computing deployment opportunity, this strategy will lead to couple more strongly Business, SaaS and PaaS levels. However, this challenges security constraints management in a dynamic environment. The development of security policies is usually based on a systematic risks analysis, reducing them by adopting appropriate countermeasures. These approaches are complex and as a consequence difficult to implement by end users. Moreover risks are assessed in a "closed" and static environment so that these methods do not fit the dynamic business services composition approach, as services can be composed and run in different business contexts (including the functionalities provided by each service, the organization (Who does what?), the coordination between these services and also the kind of data (strategic or no...) that are used and exchanged) and runtime environment (public vs private platform…). By analyzing these contextual information, we can define specific security constraints to each business service, specify the convenient security policies and implement appropriate countermeasures. In addition, it is also necessary to be able to propagate the security policies throughout the process to ensure consistency and overall security during the process execution. To address these issues, we propose to study the definition of security policies coupling Model Driven Security and Pattern based engineering approach to generate and deploy convenient security policies and protection means depending on the (may be untrusted) runtime environment. To this end, we propose a set of security patterns which meet the business and platform related security needs to set the security policies. The selection and the implementation of these security policies will be achieved thank to context-based patterns. Simple to understand by non-specialists, these patterns will be used by the model transformation process to generate these policies in a Model@Runtime strategy so that security services will be selected and orchestrated at runtime to provide a constant quality of protection (independent of the deployment)
Mekki, Mohamed-Anis. "Synthèse et compilation de services web sécurisés." Thesis, Nancy 1, 2011. http://www.theses.fr/2011NAN10123/document.
Full textAutomatic composition of web services is a challenging task. Many works have considered simplified automata models that abstract away from the structure of messages exchanged by the services. For the domain of secured services we propose a novel approach to automated composition of services based on their security policies. Given a community of services and a goal service, we reduce the problem of composing the goal from services in the community to a security problem where an intruder we call mediator should intercept and redirect messages from the service community and a client service till reaching a satisfying state. We have implemented the algorithm in AVANTSSAR Platform and applied the tool to several case studies. Then we present a tool that compiles the obtained trace describing the execution of a the mediator into its corresponding runnable code. For that we first compute an executable specification as prudent as possible of her role in the orchestration. This specification is expressed in ASLan language, a formal language designed for modeling Web Services tied with security policies. Then we can check with automatic tools that this ASLan specification verifies some required security properties such as secrecy and authentication. If no flaw is found, we compile the specification into a Java servlet that can be used by the mediatior to lead the orchestration
Breton, Julie. "L'imputabilité des services de renseignement au Canada : le Service canadien du renseignement de sécurité et le Centre de la sécurité des télécommunications." Thesis, Université Laval, 2006. http://www.theses.ulaval.ca/2006/23860/23860.pdf.
Full textCoronado, Etienne S. "Une architecture de services sur demande pour les communications sans fils véhiculaire." Thèse, Université de Sherbrooke, 2010. http://savoirs.usherbrooke.ca/handle/11143/1945.
Full textAudette-Chapdelaine, Marianne. "La dynamique des relations entre acteurs publics et privés dans la gestion des services d'eau urbains : les cas de Montréal et Marseille." Thesis, Université Laval, 2008. http://www.theses.ulaval.ca/2008/25440/25440.pdf.
Full textDrais, Eric. "Risques au travail et dynamiques des organisations : le cas d'une entreprise de services." Paris 9, 2002. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=2002PA090045.
Full textRabhi, Issam. "Testabilité des services Web." Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2012. http://tel.archives-ouvertes.fr/tel-00738936.
Full textEymeoud, Camille. "La coopération entre les établissements publics et privés de santé : état des lieux et démarche prospective." Thesis, Aix-Marseille, 2018. http://www.theses.fr/2018AIXM0200.
Full textThe cooperation of recent legislative reforms has been preferred to other restructuring tools. However, in the early 2000s, it appears that cooperation between public and private health facilities is not really satisfactory. With the law of health a break is made. This law, in addition to making changes to the sanitary cooperation grouping tool allows the creation of a new tool: the territorial hospital grouping. All public health establishments must, except in exceptional cases, be members of a regional hospital group. One thinks "course" and "shared medical project" at the scale of a territory of health. However, in practice it became clear that the territorial hospital grouping was not yet a fully convincing tool. It was then necessary to adopt a forward-looking approach and make proposals for changes so that cooperation between health care institutions could truly be considered as a major lever for a more efficient health system
Alimi, Vincent. "Contributions au déploiement des services mobiles et à l'analyse de la sécurité des transactions." Phd thesis, Caen, 2012. http://www.theses.fr/2012CAEN2061.
Full textElectronic transactions have paved the way for a multitude of services in various forms : a home banking web portal, an access control smart card opening a door or paying a transit fare, or an application downloaded onto a computer or a mobile device such a personal digital assistant or a mobile phone. The latter category of mobile equipment is extremely promising in terms of service offers. Indeed, a mobile handheld device is connected to the Internet with speeds higher and higher and is also more powerful. With the advent of the NFC (Near Field Communication) technology and secure architectures, mobile devices now has the ability to host sensitive applications in a secure chip, called « Secure Element ». Unlike plastic form factors, the Secure Element is a dynamic environment where you can download applications that will be accessible by a reader such as a point of sale or an access control reader. Those services are called mobile contactless services or NFC mobile services. We propose in this thesis several contributions to facilitate the deployment of mobile services based on a Secure Element. The adoption of this high added value services relies on an infrastructure and tools shared by different actors. As a first step, we propose three contributions to aid the deployment of mobile services Secure Element based allowing to: facilitate the personalization of a Secure Element by a TSM non-owner thereof, facilitate the exchange of keys for the TSM and perform a transaction with a mobile phone as a point of sale. In a second step, we focus on the analysis of payment transactions