Дисертації з теми "Circulation – Mesures de sécurité – Évaluation"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Circulation – Mesures de sécurité – Évaluation".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Zargouni, Yadh. "Évaluation de l'efficacité des mesures de sécurité routière." Paris 6, 1986. http://www.theses.fr/1986PA066194.
Повний текст джерелаVache, Géraldine. "Evaluation quantitative de la sécurité informatique : approche par les vulnérabilités." Toulouse, INSA, 2009. http://eprint.insa-toulouse.fr/archive/00000356/.
Повний текст джерелаThis thesis presents a new approach for quantitative security evaluation for computer systems. The main objective of this work is to define and evaluate several quantitative measures. These measures are probabilistic and aim at quantifying the environment influence on the computer system security considering vulnerabilities. Initially, we identified the three factors that have a high influence on system state: 1) the vulnerability life cycle, 2) the attacker behaviour and 3) the administrator behaviour. We studied these three factors and their interdependencies and distinguished two main scenarios based on nature of vulnerability discovery, i. E. Malicious or non malicious. This step allowed us to identify the different states of the system considering the vulnerability exploitation process and to define four measures relating to the states of the system: vulnerable, exposed, compromised, patched and secure. To evaluate these measures, we modelled the process of system compromising by vulnerability exploitation. Afterwards, we characterized the vulnerability life cycle events quantitatively, using real data from a vulnerability database, in order to assign realistic values to the parameters of the models. The simulation of these models enabled to obtain the values of the four measures we had defined. Finally, we studied how to extend the modelling to consider several vulnerabilities. So, this approach allows the evaluation of measures quantifying the influences of several factors on the system security
Dacier, Marc. "Vers une évaluation quantitative de la sécurité informatique." Phd thesis, Institut National Polytechnique de Toulouse - INPT, 1994. http://tel.archives-ouvertes.fr/tel-00012022.
Повний текст джерелаLes modèles formels développés pour l'étude de la sécurité informatique, n'offrent pas le cadre mathématique désiré. L'auteur montre qu'ils adoptent une hypothèse de pire cas sur le comportement des utilisateurs, incompatible avec une modélisation réaliste. Après avoir montré, sur la base du modèle take-grant, comment s'affranchir de cette hypothèse, l'auteur définit un nouveau modèle, le graphe des privilèges, plus efficace pour gérer certains problèmes de protection. Il illustre son utilisation dans le cadre des systèmes Unix.
Enfin, l'auteur propose d'évaluer la sécurité en calculant le temps et l'effort nécessaires à un intrus pour violer les objectifs de protection. Il montre comment définir un cadre mathématique apte à représenter le système pour obtenir de telles mesures. Pour cela, le graphe des privilèges est transformé en un réseau de Petri stochastique et son graphe des marquages est dérivé. Les mesures sont calculées sur cette dernière structure et leurs propriétés mathématiques sont démontrées. L'auteur illustre l'utilité du modèle par quelques résultats issus d'un prototype développé afin d'étudier la sécurité opérationnelle d'un système Unix.
Seigneur, Viviane. "La sécurité en haute montagne : penser la sécurité, jugement de fait, jugement de valeur...et autres jugements : approche anthropologique et sociologique." Rouen, 2003. http://www.theses.fr/2003ROUEL448.
Повний текст джерелаThe subject of this thesis is security in high mountain. This work reveals how the security initiatives are built and what the regulation mechanics are. With this aim in view, the research focus on the knowledge which influences on this mechanisms. This knowledge is studied from three points of view. The first one is about the daily life, the second one is about the institutional world and the last one is about the general relationships with risk. Moreover, this research studies the weight of the "non rationals logics" as opposed to "interests logics" (more or less economics) which influence the collective organisation of security. The high mountain is a good illustration with its little economic stakes, a limited scientific knowledge and a very strong mythical potential. The socio-anthropological approach is particularly interesting to identify this different "non rational" dynamisms
Rouzies, Françoise. "La question de la sécurité dans l'aviation civile : la navigation aérienne à l'épreuve de la société du risque." Paris 1, 2009. http://www.theses.fr/2009PA010724.
Повний текст джерелаMacchi, Luigi. "A Resilience Engineering approach for the evaluation of performance variability : development and application of the Functional Resonance Analysis Method for air traffic management safety assessment." Paris, ENMP, 2010. http://pastel.archives-ouvertes.fr/pastel-00589633.
Повний текст джерелаThis thesis demonstrates the need to develop systemic safety assessment methods to account for the effect of performance variability on air traffic management safety. Like most modern socio-technical systems, air traffic management is so complex that it is impossible for it to be completely described. As consequence, performance cannot be completely specified because it must vary to meet performance demands. Performance variability is an inevitable asset to ensure the functioning of an organisation and at the same time can be harmful for system safety when it combines in an unexpected manner. This argument clearly indicates the need for safety assessment methods that can deal with performance variability. The Functional Resonance Analysis Method (FRAM) has the ability to model performance variability. However parts of the FRAM can be improved to expand its capabilities to evaluate performance variability. This thesis addresses this weakness and develops a methodology for the evaluation of performance variability. The methodology has been applied on a safety assessment case study for the German air traffic management domain. The results have been compared with the official results of a traditional safety assessment. The comparison shows the added valued of the proposed methodology. In particular it illustrates the possibility to identify emergent risks and human contribution to system safety
Ouattara, Baba Ouinténi. "Contribution à l'analyse, l'évaluation et la mise en œuvre des nouveaux moyens de contrôle du trafic aérien : application à l'Afrique occidentale." Toulouse 2, 2005. http://www.theses.fr/2005TOU20023.
Повний текст джерелаIn the first part of this study, a state of the art about the current means and methods devoted to Air Traffic Control, specially considering the new navigation systems, is presented. Then the central concept of potential conflict is introduced and characterized geometrically. A probabilistic and a fuzzy logic approach are introduced to evaluate the criticity of a potential conflict. Then the analysis of different proposals to cope with the resolution of conflicts leads to develop a strategic resolution approach which seems more compatible with the on board delegation to solve conflicts. In the last part of this thesis, the consequences of the adoption of a partial delegation within an airspace characterized by a low density traffic with partial radar coverage, are upraised, showing by comparison with the current practice the clear interest for their adoption
Guts, Nataliya. "Auditabilité pour les protocoles de sécurité." Paris 7, 2011. http://www.theses.fr/2011PA077004.
Повний текст джерелаSecurity protocols often log some data available at runtime for an eventual a posteriori analysis, called audit. In practice, audit procedures remain informal, and the choice of log contents is left to the programmer's common sense. The goal of this dissertation is to formalize and verify the properties expected from audit ! logs. First we consider the use of logs in so called optimistic security protocols which, as opposed to classic security protocols, rely on the logs to postpone certain security checks until the end of execution. We formally study two optimistic schemes: value commitment scheme and offline e-cash; using process languages techniques, we prove that the information logged by their implementations suffices to detect the cheat of participants, if any. Then we define auditability as the ability of a protocol to collect enough evidence to convince an audit ! procedure (judge). We propose a method based on types with logical refinements to verify auditability, and ; implement it as an extension to an existing typechecker. We show that verifying auditability boils down to typechecking the protocol implementation. We also implement logical support for generic pre- and post-! conditions to enhance modular typechecking of higher-order functions
Plourde, Guillaume. "Évaluation quantitative de l'exposition à la radiation en cardiologie interventionnelle : approche transradiale et facteurs techniques." Doctoral thesis, Université Laval, 2017. http://hdl.handle.net/20.500.11794/27673.
Повний текст джерелаCoronary artery disease is the leading cause of mortality throughout the world. Percutaneous coronary interventions are increasingly used as diagnostic and therapeutic tools applied to patient care. The use of X-rays is mandatory to perform these procedures. The side effects of radiation exposure are amongst the risks to which patients undergoing a percutaneous coronary intervention are exposed. In order to minimize these risks, one must identify and optimize factors influencing radiation exposure. Amongst them, the radial vascular access site has been inconsistently associated with an increased exposure, even if it is increasingly adopted worldwide as the primary access site. Other factors have also been identified, yet a clinical classification based on their optimization potential by the physician at patient’s bedside remains to be described. The aims of this thesis were identification of technical factors that could be modified at patient’s bedside and formulation of clinical recommendations influencing patient’s radiation exposure. Four independent and complementary projects have been proposed targeting revascularization strategy, catheters number and type, fluoroscopy acquisition rate and vascular access site as potential factors influencing radiation exposure. All studies were lead at Institut universitaire de cardiologie et de pneumologie de Québec. Fluoroscopy time and dose-area product were used as surrogate indicators of radiation exposure. Our results imply that the revascularization strategy did not influence radiation exposure, but that the use of a multiple catheters approach and a 7.5 images per second low-rate fluoroscopy were associated with a reduction of patient’s radiation exposure. Transradial access was associated with a modest increase in radiation exposure when compared with transfemoral access, but the clinical significance of this small increase is uncertain and unlikely to outweigh the clinical benefits of transradial access. In conclusion, identification of technical factors associated with a reduction in radiation exposure enables the formulation of clinical recommendations aiming at risk minimization for the patient and encourages good radiation protection practices.
Gadelrab, Mohammed El-Sayed Gadelrab. "Évaluation des systèmes de détection d'intrusion." Toulouse 3, 2008. http://thesesups.ups-tlse.fr/435/.
Повний текст джерелаThis thesis contributes to the improvement of intrusion detection system (IDS) evaluation. The work is motivated by two problems. First, the observed increase in the number and the complexity of attacks requires that IDSes evolve to stay capable of detecting new attack variations efficiently. Second, the large number of false alarms that are generated by current IDSes renders them ineffective or even useless. Test and evaluation mechanisms are necessary to determine the quality of detection of IDSes or of their detection algorithms. Unfortunately, there is currently no IDS evaluation method that would be unbiased and scientifically rigorous. During our study, we have noticed that current IDS evaluations suffer from three major weaknesses: 1) the lack of a rigorous methodology; 2) the use of non-representative test datasets; and 3) the use of incorrect metrics. From this perspective, we have introduced a rigorous approach covering most aspects of IDS evaluation. In the first place, we propose an evaluation methodology that allows carrying out the evaluation process in a systematic way. Secondly, in order to create representative test datasets, we have characterized attacks by classifying attack activities with respect to IDS-relevant manifestations or features. This allows not only to select attacks that will be included in the evaluation dataset but also to analyze the evaluation result with respect to attack classes rather than individual attack instances. Third, we have analyzed a large number of attack incidents and malware samples, such as viruses and worms. Thanks to this analysis, we built a model for the attack process that exhibits the dynamics of attack activities. This model allows us to generate a large number of realistic and diverse attack scenarios. The proposed methods have been experimented on two very different IDSes to show how general is our approach. The results show that the proposed approach allows overcoming the two main weaknesses of existing evaluations, i. E. , the lack of a rigorous methodology and the use of non-representative datasets. .
Bouchiba, Anass. "Evaluation de dysfonctionnement d'un système par approche bayesienne : cas du système ferroviaire." Angers, 2013. http://tel.archives-ouvertes.fr/tel-00842756.
Повний текст джерелаThe development of railway in urban and non urban, is accompanied by recess continuous improvement of safety, which remains a primary concern in this area of transport, where accidents continue to cause significant damage, and cause a large number of victims. The control of risks of rail transport implies firstly the identification and prediction of risk, and secondly, reducing these risks by acting on ways to decrease their occurrence, their severity, mitigating their consequences by means of avoidance and protection against risks. In this context, the present work of this thesis is to develop an assessment tool and risk analysis at Level Crossings of the Moroccan railway network, which has 521 level crossings with about 80% are not guarded, and the railway network of tram in the cities of Rabat/Salé, which extends on 20 km and which its urban integration has not been without effect on the city, because accidents between the tram and road users whether pedestrians or vehicles, continue to occur and recorded about ten accidents per month of varying severity. The risk analysis of these two systems is based primarily on the functional and dysfunctional studies, then secondly on risk modelling by Bayesian Networks. In fact, the Bayesian approach in evaluating dysfunctions and quantification of the risks constitutes an analysis approach allowing taking into account the behavioural and temporal aspects of the system (events related to human factors or equipment, of random events of accidents, uncontrolled consequences of accidents etc. ). The risk model proposed also allows for a risk prediction based on data collected from the past (feedback)
Maghrebi, Houssem. "Les contre-mesures par masquage contre les attaques HO-DPA : évaluation et amélioration de la sécurité en utilisant des encodages spécifiques." Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00913472.
Повний текст джерелаWiss, Jacques. "Contribution à l'étude de la sécurité des réacteurs chimiques au point d'ébullition par utilisation du refroidissement par évaporation : techniques d'évaluation des risques, méthodes de conception d'installations sûres." Mulhouse, 1992. http://www.theses.fr/1992MULH0250.
Повний текст джерелаDidelot, Armelle. "Contribution à l'identification et au contrôle des risques dans le processus de conception." Vandoeuvre-les-Nancy, INPL, 2001. http://www.theses.fr/2001INPL566N.
Повний текст джерелаDequaire-Falconnet, Elodie. "Modélisation de l'activité individuelle et collective dans la perspective d'une prévention des risques des installations, dès la conception : Application au domaine de l'imprimerie." Compiègne, 2001. http://www.theses.fr/2001COMP1368.
Повний текст джерелаBachy, Yann. "Sécurité des équipements grand public connectés à Internet : évaluation des liens de communication." Thesis, Toulouse, INSA, 2015. http://www.theses.fr/2015ISAT0014/document.
Повний текст джерелаToday, equipment embedding software and an Internet connection are more and more numerous and various. With the emergence of “the internet of things” and the trend to interconnect everything, many equipment used in our every day life are now connected to the internet: Smart-Tvs, DVD players, alarm and home automation systems, and even health assistance home devices, for example. Unfortunately, these technological evolutions also introduce new security threats. The massive use of internet facilitates the propagation of malware, capable of targeting any computer device, and more specifically any internet connected device. Although several methods allowing security analysis of industrial systems exist, their application to home devices is still limited. The existence and the criticality of potential vulnerabilities in these devices are not well-known, because they have not been thoroughly studied. This is precisely the objective of this thesis, which presents a method allowing to carry out a vulnerability analysis of internet connected home devices. This method is composed of two main phases: a risk analysis phasefollowed by an experimental phase. The security analysis of any type of equipement, requires a good knowledge ofits environment. In order to guide the evaluator in this task, we propose, as a first step, to rely on existing risk analysis methods. These methods are now mature, and allow the evaluator to obtain a global view of the risks incurred by the usage of anequipment. Then, during the second step of our method, the evaluator concentrates on the most important risks in order to demonstrate the technical feasibility of the scenarios leading to the considered risks, by carrying out several experiments.Considering the large amount and the diversity of I/Os on connected devices, it is important to focus on specifically rich attack scenarios, possibly depending on a simple local vulnerability. For this second step, an experimental method is proposedin order to study these attack scenarios, which, moreover, target equipement whose specifications are not necessarily available.In order to illustrate the entire method, this thesis presents two case studies: Integrated Access Devices and Smart-Tvs. These studies are carried out on a panel of devices from major internet service providers and TV manufacturers, allowing us to compare several devices available on the market. The vulnerabilities pointed out, mainly concern the communication means (local loop for the IAD, DVB-T interface for the smart-TVs) connecting these devices to their service providers (ISP for the IAD, TV and VoD for the smart-TVs). These communication links are usually considered safe, and have been, to our knowledge, seldom explored. Thisthesis thereby contributes to the security analysis of these particular communication means for connected devices and points out some original attack paths. Finally, this thesis ends by presenting different existing security mechanisms that can be used to avoid exploitation of the identified weaknesses
Chaudemar, Jean-Charles. "Étude des architectures de sécurité de systèmes autonomes : formalisation et évaluation en Event B." Thesis, Toulouse, ISAE, 2012. http://www.theses.fr/2012ESAE0003/document.
Повний текст джерелаThe study of complex system safety requires a rigorous design process. The context of this work is the formal modeling of fault tolerant autonomous control systems. The first objective has been to provide a formal specification of a generic layered architecture that covers all the main activities of control system and implement safety mechanisms. The second objective has been to provide tools and a method to qualitatively assess safety requirements. The formal framework of modeling and assessment relies on Event-B formalism. The proposed Event-B modeling is original because it takes into account exchanges and relations betweenarchitecture layers by means of refinement. Safety requirements are first specified with invariants and theorems. The meeting of these requirements depends on intrinsic properties described with axioms. The proofs that the concept of the proposed architecture meets the specified safety requirements were discharged with the proof tools of the Rodin platform. All the functional properties and the properties relating to fault tolerant mechanisms improve the relevance of the adopted Event-B modeling for safety analysis. Then, this approach isimplemented on a study case of ONERA UAV
Clavet, Nicholas-James. "Évaluation des mesures de soutien aux personnes et aux familles : une approche par microsimulations comptables et comportementales." Doctoral thesis, Université Laval, 2018. http://hdl.handle.net/20.500.11794/30983.
Повний текст джерелаOver the next few years, the population aging will exert significant pressure on the public finances of Canada and Quebec. In a worrying fiscal context, the governments of Canada and Quebec will be tempted to reduce or at least limit their spending on expensive programs, such as person and family support programs. This thesis, therefore, seeks to develop and use tools enabling the assessment of the effects of support measures for persons and families before they are implemented 1) on their income, 2) on their working behavior, and 3) on public finances. Assessment of the effects of a support measure prior to its implementation (ex-ante evaluation) requires the use of special methods since it is not possible to deduce the effects of the measure from collected data. It is, therefore, necessary to use an accounting and behavioral microsimulation approach. The support measures for persons and families studied in this thesis focus on two themes: 1) poverty reduction through direct benefits to persons and families, and 2) reduction of net childcare expenses for parents. Chapter 1 examines the impact of a proposal for a guaranteed minimum income made by the Comité consultatif de lutte contre la pauvreté et l'exclusion sociale du Québec(Advisory Committee to Combat Poverty and Social Exclusion in Quebec). The analyses are carried out using accounting microsimulations and a structural discrete choice model of labor supply taking into account the tax system. The simulations show that the application of the original proposal has significant negative impacts on the labor market participation rate of low-income individuals and that its cost exceeds $2 billion annually. This exercise demonstrates that, contrary to what is generally believed, mechanisms to ensure a guaranteed income can have the effect of increasing the incidence of low income rather than reducing it. Chapter 2 examines the effects of increasing the age of eligibility for Old Age Security benefits and the Guaranteed Income Supplement from 65 to 67 years of age. The analyses are carried out using a reduced-form dynamic microsimulation model that projects Canada's socioeconomic evolution up to 2030. The simulations show that in the long term (i.e., 2030), increasing the age of eligibility increases the federal government's net revenues by $6.9 billion, but decreases the provincial revenues by $620 million. With constant labor and saving behavior, this reform increases the low-income rate of 65 to 66-year-olds (about 100,000 more seniors in low-income situations) from 6% to 17%. The poorest and the women are the most v penalized. Chapter 3 examines the effects of the three main public funding measures for childcare services (the provincial tax credit, the federal tax deduction, and direct childcare subsidies) on family income, women's participation to the labor market, and the public finances of Quebec and Canada. These effects are estimated using a structural model of labor supply comparable to that used in Chapter 1. The simulations show that child care financing measures increase overall and significantly the income of families after taxes, transfers, and childcare expenses; The measures also have a greater impact on the income and work of single mothers than on mothers in couple. Their abolition would result in substantial savings in provincial public finances but would be of little use to the federal government. Chapter 4 examines the effects of two reforms of childcare services' public funding on families and public finances. The first reform was introduced in 2015 by the Government of Quebec, while the second was a reform proposal made by the Commission de révision permanente des programmes (Permanent Program Review Committee) and the Commission d'examen sur la fiscalité québécoise (Québec Taxation Review Committee). The effects of these reforms are assessed using accounting microsimulations. A major finding of the analysis of the advantages and disadvantages of the two reforms is that the reform of the two commissions is more advantageous than the current reform of the Government of Quebec for families and provincial government. In addition, reform proposals can be made to lead the federal government to make a greater contribution to childcare funding, which limits the financial burden of childcare costs for families...
Piwowar, Julien. "Analyse des risques de malveillance sur systèmes complexes : anticipation et aide à la décision dans le cadre sécurité globale." Troyes, 2010. http://www.theses.fr/2010TROY0006.
Повний текст джерелаIncreased of economic, material or human flows, in ever-larger areas and in a reduced time imply a grow up need to secure these exchanges. This globalization is applied to all systems, which are connected through net-works today. In fact, the interdependence of each one lead to a global threat which generates risks of several malevolent procedures from simple degradation to terrorism. Now, it is not possible to manage the security of these complex systems with only mathematical methods or experimental judgments. So, it is the opportunity to develop a method combining analytical and behavioral science. The topic of the thesis is to build a general framework to capture the various characteristics of a system put in its environment with a holistic approach (systemic analysis). Then, the goal is to assess (with expert judgement) vulnerabilities associated to each component of the system and describe all critical paths using an adequate support with a global overview: human and goods flows, security systems, surveillance networks with closed-Circuit Television (CCTV), etc. The purpose of such a methodology is to permit stakeholders to simulate attacks on their infrastructure, according to several profiles of aggressors in a evoluating and dynamic con-text. Especially, it is a decision making tool to optimize security at all points of the system and to observe the global associated effects, and consequently to emphasize the concept of anticipation
Otsa'a, Nguema Daenis. "Sécurité et sûreté maritimes dans le golfe de Guinée : Diagnostic et évaluation des politiques pour un apport conceptuel et pratique de la sécurisation maritime régionale." Nantes, 2015. http://www.theses.fr/2015NANT3004.
Повний текст джерелаOne limited to the simple role of communication channel used to search for new unknown lands with the use of resources, maritime spaces and their related activities have gradually evolved into a controversial topic today. The issues have also presented threats and risks of vulnerability, associated with binomial “safety-security”, in a field where economies and populations have a strong maritime emphasis. This paradoxical maritime trend has not been overlooked by the coastal State of the Gulf of Guinea (the Ivory Coast to Angola), which were already involved at the beginning of the negotiations which led to what was called, the “Yalta sea” (in reference to the Montego Bay Convention of December 10, 1982). Today, they are trying to find solutions to the phenomenon of maritime insecurity through more community responses rather than individual ones. As part of global geography of strategic regions, they cannot and must not remain on the sidelines of the acceleration of security and logistics, which require different levels of communal sharing of control and prevention methods. But, while it is no longer time for the prevarication of communal sharing efforts, it is time for the assessment of policies used up to now, which have, to some degree, shown to be limited. In fact, regional maritime insecurity is not potentially or spatially manifested in the same way, according to the States or regions considered. Yet, despite a disparate consideration of the regional maritime issues, maritime security challenges to be addressed are virtually the same and should guide an in depth study of conceptualization and practical security. This disparity of ideological, structural, material, and technical realities of the manifestation of threat and risk is not adequately addressed in regional cooperation, which by its excessive ambitions and homogenization of the maritime context, hardly takes into account the necessity of an evolutive multi-scalar dimension, based on local and national realities. Within the disciplinary field of geopolitics and maritime geostrategies, and more specifically, the issues of maritime security, this study, which considers national and regional factors of maritime vulnerability through the “Safety-Security” binomial, offers a contribution to the question, “why provide security”, but also “how to provide security”, across four strategies: the diagnosis of maritime vulnerability, the evaluation of responses of States to address it, the spatial heterogeneity of this vulnerability, and to propose multiscalar reforms in light of maritime security regionalism
Piètre-Cambacédès, Ludovic. "Des relations entre sûreté et sécurité." Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00570432.
Повний текст джерелаEljamassi, Alaeddinne. "Utilisation des systèmes d'information géographique (SIG) dans la gestion des risques routiers en milieu urbain." Saint-Etienne, 2006. http://www.theses.fr/2006STET2088.
Повний текст джерелаThe integration of spatial dimension in the analysis of road accidents was less well treated before the integration of GIS (Geographical Information Systems) and their tools for spatial analysis which open a new perspective to us. The thesis aims to customize some urban accident risk models developed at the Transport Research Laboratory in England to the context of French and Arabic countries in the Middle East. Some simplification of the data collection and coding necessary for these models, is proposed in order to implement these models in an easier way for road risk management ; A fair identification and localization of the major problems of road risk in urban area is now possible through the use of GIS technology as a tool for decision-making
Noumon, Allini Elie. "Caractérisation, évaluation et utilisation du jitter d'horloge comme source d'aléa dans la sécurité des données." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSES019.
Повний текст джерелаThis thesis, funded by the DGA, is motivated by the problem of evaluation of TRNG for applications with a very high level of security. As current standards such as AIS-31 are not sufficient for these types of applications, the DGA proposes a complementary procedure, validated on TRNG using ring oscillators (RO), which aims to characterize the source of randomness of TRNG in order to identify electronic noises present in it. These noises are manifested in the digital circuits by the clock jitter generated in the RO. They can be characterized by their power spectral density related to the time Allan variance which allows, unlike the standard variance which is still widely used, to discriminate these different types of noise (mainly thermal, flicker). This study was used as a basis for estimating the proportion of jitter due to thermal noise used in stochastic models describing the output of TRNG. In order to illustrate and validate the DGA certification approach on other principles of TRNG apart from RO, we propose a characterization of PLL as a source of randomness. We have modeled the PLL in terms of transfer functions. This modeling has led to the identification of the source of noise at the output of the PLL, as well as its nature as a function of the physical parameters of the PLL. This allowed us to propose recommendations on the choice of parameters to ensure maximum entropy. In order to help in the design of this type of TRNG, we also propose a tool to search for the non-physical parameters of the generator ensuring the best compromise between security and throughput
Demay, Jonathan-Christofer. "Génération et évaluation de mécanismes de détection des intrusions au niveau applicatif." Phd thesis, Université Rennes 1, 2011. http://tel.archives-ouvertes.fr/tel-00659694.
Повний текст джерелаMekki, Mokhtar Amina. "Processus d'identification de propriétés de sécurité-innocuité vérifiables en ligne pour des systèmes autonomes critiques." Toulouse 3, 2012. http://thesesups.ups-tlse.fr/1776/.
Повний текст джерелаRecent progress in the definition of decisional mechanisms has allowed computer-based systems to become more and more autonomous. For example, service robots can nowadays work in direct interaction with humans and carry out increasingly complex tasks. This transfer of responsibility poignantly raises the issue of system safety towards humans, the environment and the system itself. System surveillance by an independent safety monitor aims to enforce safe behaviour despite faults and uncertainties. Such a monitor must detect potentially dangerous situations in order to trigger safety actions aiming to bring the system towards a safe state. This thesis addresses the problem of identifying safety trigger conditions. A systematic process is proposed for the identification, starting from a HazOp/UML risk analysis. The proposed methodology also allows the identification of system states in which multiple safety actions might be executed concurrently, in order to be checked and, if necessary, corrected by a system expert. The methodology is applied to a robotic rollator
Obeid, Nizar. "Évaluation des performances en localisation d’un radar ultra large bande millimétrique pour l’automobile." Thesis, Lille 1, 2010. http://www.theses.fr/2010LIL10139/document.
Повний текст джерелаIn order to ensure maximum safety of users of road transport and to reduce the number of road accidents, considerable scientific research is conducted. The use of radar mounted on vehicles is a considered technological entry point. The required functions are measuring the distance and the velocity of fixed or mobile obstacles and providing their directions of arrival. More recently, a secondary vehicle to vehicle communication function has been suggested for these radar sensors. This thesis was part of a national research project launched in 2007 entitled "Communication inter VEhicules and accurate relative LOcation (VELO)" following a call for tenders from the French National Agency of Research. This project aims to design and to implement a radar sensor operating at the recently assigned millimeter frequency band of 79 GHz. Different functions must be provided by this sensor: Detection and radial distances of the targets; Targets speed measurements; Vehicle to vehicle communication; and Accurate targets relative location. The ultimate goal of these sensors is to constitute a safety virtual belt operating at 360 ° all around the vehicle, providing a high resolution localization of all the surrounding targets and the ability to communicate with other vehicles. In this work we focus particularly on the part “accurate relative localization of the targets”. We show that through the use of the ultra wideband (UWB) technique and of sub nanosecond pulses we can simultaneously satisfy these requirements. To evaluate the relative localization accuracy provided by this approach, the impact of different parameters are modeled: pulse waveforms, sampling rate, jitter, TOA, TDOA, DOA (Time Of Arrival, Time Difference Of Arrival, Direction Of Arrival) methods. Simulation models needed to assess overall system performance relative location were implemented and developed in MatlabTM and ADSTM. These simulation results have been validated during an experimental phase where we have localized sources emitting at 4 GHz and 60 GHz in a laboratory environment. A channel model considering a two-ray approach was also implemented in the simulations and experimentally validated at 63 GHz
Varet, Antoine. "Conception, mise en oeuvre et évaluation d'un routeur embarqué pour l'avionique de nouvelle génération." Phd thesis, INSA de Toulouse, 2013. http://tel.archives-ouvertes.fr/tel-00932283.
Повний текст джерелаLlorens, Cédric. "Mesure de la sécurité "logique" d'un réseau d'un opérateur de télécommunications." Phd thesis, Télécom ParisTech, 2005. http://pastel.archives-ouvertes.fr/pastel-00001492.
Повний текст джерелаZouinkhi, Ahmed. "Contribution à la modélisation de produit actif communicant : spécification et évaluation d'un protocole de communication orienté sécurité des produits." Thesis, Nancy 1, 2011. http://www.theses.fr/2011NAN10010/document.
Повний текст джерелаMonitoring of chemical product storage is a delicate operation in the sense that it requires knowledge of the nature of each stored product, their location, their interaction and possible actions to be implemented in case of emergency. To facilitate the storage management, this thesis proposes to use the concept of ambient where the product has its own information system and wireless communication so as to make it intelligent and autonomous. This thesis proposes and develops a model of internal behavior of active product that allows a distributed approach of active security. This can lead to a communication protocol of application level to embed the active products. This protocol is formally assessed using hierarchical colored Petri nets. Finally, this protocol is implemented in the simulator Castalia/Omnet++ to analyze it in several scenarios and also for the experience when going to scale. The results show the usefulness and feasibility of the concept of active product
Swiderek, Karolina. "Communication et processus organisants : le cas du traitement des évènements de sécurité dans le domaine du contrôle aérien." Toulouse 3, 2014. http://thesesups.ups-tlse.fr/2474/.
Повний текст джерелаOur object of study is situated in the field of air traffic control, and more specifically concerns what is identified as " security events processing system " in the wider context of " system security management ". The aviation security must be controlled and constantly rework due to the increase of the air traffic. The regulatory and technical evolutions are associated with new stakes related to quality and safety approaches. These approaches are based on a principle of continuous enhancement implemented through what is called in terms of " security events notification and processing " as well as " experience feedback ". However, the norms are never simply applied, they are tested in concrete situations, negotiated and interpreted. In this research, we question textualization forms (Taylor, 1993) of organizations through the norms inscribe in prescriptive texts and other " professional writings " omnipresent in organizations (Delcambre, 1990, 1993). We question organizing processes from the point of view of the way in which they constitute, negotiate and recompose between different scriptural forms. We propose to contribute to a renewed communicative approach of organizations, mobilizing and reworking some of the contributions of two very contemporary approaches: the approaches of communication as constitutive of organization (CCO) characteristics of all current North American researches and the communicative approaches of organizations (ACO), as worked by French researchers and more broadly European
Janès, Agnès. "Caractérisation des dangers des produits et évaluation des risques d'explosion d'ATEX, contribution à l'amélioration de la sécurité des procédés industriels." Thesis, Université de Lorraine, 2012. http://www.theses.fr/2012LORR0346/document.
Повний текст джерелаControlling fire and explosion hazards in industrial processes is based on occurrence conditions and the assessment of possible effects and consequences of these events. The feedback from industrial accidents involving combustible products often reveals an insufficient identification of products hazards and/or an incorrect or incomplete risk assessment of the processes by the operators. The regulatory evolutions in the past decade were aimed at better identification and management of these risks. Nevertheless, in order to reduce the frequency and the severity of these accidents, it is necessary to further improve the safety procedures concerning combustible materials. When this evaluation is the most accurate and realistic, prevention and protection measures are the most adequate. This requires an accurate hazard characterization of the products stored, transported or used. It is also necessary to better identify and manage the risks associated. This work has been devoted primarily to the regulatory characterization of physical and chemical hazards of substances and mixtures, as well as evaluating the ability of flammable gas, vapour or dust to form explosive atmospheres and an eventual ignition. Secondly, this work have attempted to highlight the key elements of the regulatory, normative and methodological context concerning explosive atmospheres and to develop a specific methodology allowing explosive atmospheres explosion risk assessment in industrial facilities, consistent with applicable regulatory requirements
Kriaa, Siwar. "Modélisation conjointe de la sûreté et de la sécurité pour l’évaluation des risques dans les systèmes cyber-physiques." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLC014/document.
Повний текст джерелаCyber physical systems (CPS) denote systems that embed programmable components in order to control a physical process or infrastructure. CPS are henceforth widely used in different industries like energy, aeronautics, automotive, medical or chemical industry. Among the variety of existing CPS stand SCADA (Supervisory Control And Data Acquisition) systems that offer the necessary means to control and supervise critical infrastructures. Their failure or malfunction can engender adverse consequences on the system and its environment.SCADA systems used to be isolated and based on simple components and proprietary standards. They are nowadays increasingly integrating information and communication technologies (ICT) in order to facilitate supervision and control of the industrial process and to reduce exploitation costs. This trend induces more complexity in SCADA systems and exposes them to cyber-attacks that exploit vulnerabilities already existent in the ICT components. Such attacks can reach some critical components within the system and alter its functioning causing safety harms.We associate throughout this dissertation safety with accidental risks originating from the system and security with malicious risks with a focus on cyber-attacks. In this context of industrial systems supervised by new SCADA systems, safety and security requirements and risks converge and can have mutual interactions. A joint risk analysis covering both safety and security aspects would be necessary to identify these interactions and optimize the risk management.In this thesis, we give first a comprehensive survey of existing approaches considering both safety and security issues for industrial systems, and highlight their shortcomings according to the four following criteria that we believe essential for a good model-based approach: formal, automatic, qualitative and quantitative and robust (i.e. easily integrates changes on system into the model).Next, we propose a new model-based approach for a safety and security joint risk analysis: S-cube (SCADA Safety and Security modeling), that satisfies all the above criteria. The S-cube approach enables to formally model CPS and yields the associated qualitative and quantitative risk analysis. Thanks to graphical modeling, S-cube enables to input the system architecture and to easily consider different hypothesis about it. It enables next to automatically generate safety and security risk scenarios likely to happen on this architecture and that lead to a given undesirable event, with an estimation of their probabilities.The S-cube approach is based on a knowledge base that describes the typical components of industrial architectures encompassing information, process control and instrumentation levels. This knowledge base has been built upon a taxonomy of attacks and failure modes and a hierarchical top-down reasoning mechanism. It has been implemented using the Figaro modeling language and the associated tools. In order to build the model of a system, the user only has to describe graphically the physical and functional (in terms of software and data flows) architectures of the system. The association of the knowledge base and the system architecture produces a dynamic state based model: a Continuous Time Markov Chain. Because of the combinatorial explosion of the states, this CTMC cannot be exhaustively built, but it can be explored in two ways: by a search of sequences leading to an undesirable event, or by Monte Carlo simulation. This yields both qualitative and quantitative results.We finally illustrate the S-cube approach on a realistic case study: a pumped storage hydroelectric plant, in order to show its ability to yield a holistic analysis encompassing safety and security risks on such a system. We investigate the results obtained in order to identify potential safety and security interactions and give recommendations
Boniface, Antoine. "Détection et évaluation de l'endommagement mécanique du béton par émission acoustique." Thesis, Bordeaux, 2017. http://www.theses.fr/2017BORD0954/document.
Повний текст джерелаNuclear safety issues involve the evaluation of existing installations, and in particular of containment systems. The enclosure is a double sarcophagus of reinforced concrete. It constitutes a protective barrier to both the reactor of an external aggression but also an agent of protection of the exterior of a possible leak in case of accident. The correct functioning of the enclosure is ensured in full filling of the functions of resistance and sealing. The evaluation of these two functions in particular for monitoring the state of cracking of the enclosure.The cracking of the concrete is associated with the development of micro-cracks which appear when the local stresses of the material are exceeded. As a result of these micro-cracks, the release of energy is propagated in the material in the form of mechanical waves. This phenomenon is called "acoustic emission".Acoustic emission (EA) is also the name of the technique used to directly measure the manifestation of these micro-cracks. The EA consists of recording, by means of a network of piezoelectric sensors placed on the surface, the ultrasonic waves emitted by the micro-cracks within the material. This particularity of the AE places it at the forefront of inspection techniques for monitoring the damage and cracking of concrete.The accuracy of the existing location tools is highly dependent on the methods of analyzing the recorded EA signals. This dependence constitutes an important lock that must be lifted in order to ensure the spatial follow-up of the most reliable crack propagation possible. Moreover, the identification of the source mechanisms of EA is a crucial stake because it makes it possible to characterize the different phenomena that intervene during the propagation of crack.On the basis of tests of cracking and thermal damage of the concrete we shown the impact of the strategies of localization on the representation of the damage. Based on our results, we proposed a spatial analysis based on the acoustic event density and the released energy allowing to follow the propagation of the thermal damage also of the cracking in the specimens. An original analysis of the signals by cross-correlation is proposed in order to group the signals into classes. Finally, the methods developed were applied during crack opening and referencing trials on the Onera blower and on a 1/3 scale model of a nuclear power plant confinement enclosure called “Vercors”
Le, Duy Tu Duong. "Traitement des incertitudes dans les applications des études probabilistes de sûreté nucléaire." Troyes, 2011. http://www.theses.fr/2011TROY0022.
Повний текст джерелаThe aim of this thesis is to propose an approach to model parameter and model uncertain-ties affecting the results of risk indicators used in the applications of nuclear Probabilistic Risk assessment (PRA). After studying the limitations of the traditional probabilistic approach to represent uncertainty in PRA model, a new approach based on the Dempster-Shafer theory has been proposed. The uncertainty analysis process of the pro-posed approach consists in five main steps. The first step aims to model input parameter uncertainties by belief and plausibility functions ac-cording to the data PRA model. The second step involves the propagation of parameter uncertainties through the risk model to lay out the uncertainties associated with output risk indicators. The model uncertainty is then taken into account in the third step by considering possible alternative risk models. The fourth step is intended firstly to provide decision makers with information needed for decision making under uncertainty (parametric and model) and secondly to identify the input parameters that have significant uncertainty contributions on the result. The final step allows the process to be continued in loop by studying the updating of beliefs functions given new data. The pro-posed methodology was implemented on a real but simplified application of PRA model
Bhatti, Junaid. "Les facteurs environnementaux dans les accidents de la circulation sur des routes interurbaines dans les pays en développement." Thesis, Bordeaux 2, 2010. http://www.theses.fr/2010BOR21724/document.
Повний текст джерелаBackground: Interurban traffic safety is a major public health problem, but has received little attention in Low- and Middle-Income Countries (LMICs). The objectives of this thesis were to assess the burden of injury related to interurban traffic, and reporting of these injuries in different datasets, to analyze situational factors (physical characteristics and environmental circumstances) associated with crash sites, and road hazard perception of high-risk crash sites in LMICs. Methods and results: These objectives were assessed in five specific studies conducted in two LMICs, Cameroon and Pakistan. In study I, traffic fatality per vehicle-km and associated crash factors were assessed using police reports for years 2004 to 2007, on the two-lane Yaoundé-Douala road section in Cameroon. Traffic fatality was 73 per 100 million vehicle-km, a rate 35 times higher than a similar road in a high-income country. Fatality was higher for crashes involving vulnerable road users, crashes between oppositely-moving vehicles, and those due to mechanical failure including tyre burst. In study II, traffic injury reporting to police, ambulance, and Emergency Department (ED) in 2008 was assessed, on the four-lane Karachi-Hala road section in Pakistan. Crash fatality was over 53 per 109 vehicle-km, a rate 13 times higher than a similar road in France. Police reported only one out of five fatalities and one out of ten severe injuries. Vulnerable road users were two times less reported in police data than ambulance or ED data. In study III, situational factors associated with injury crash sites were assessed on the Yaoundé-Douala road section, using case-control methods. Factors such as flat road profiles (adjusted Odds Ratios [OR]=1.52; 95% Confidence Interval [95%CI]=1.15-2.01), irregular surface conditions (OR=1.43; 95%CI=1.04-1.99), nearby road obstacles (OR=1.99; 95%CI=1.09-3.63), and three- (OR=3.11; 95%CI=1.15-8.39) or four-legged (OR=3.23; 95%CI= 1.51-6.92) intersections were significantly associated with injury crash sites. Furthermore, the likelihood of crash increased with built-up areas situated in plain regions (OR=2.33; 95%CI=1.97-2.77). In study IV, traffic injury burden and factors associated with Highway Work Zones (HWZs) crashes were assessed on the Karachi-Hala road section, using historical cohort methods. HWZs accounted for one third of traffic fatalities, and fatality per vehicle-km was four times higher in HWZs than other zones. One out of two HWZ crashes occurred between oppositely moving vehicles. In study V, hazard perception of high-risk (with ≥ 3 crashes in 3 years) and low-risk sites (no crash reported) from the two above road sections was assessed by showing videos to voluntary Pakistani drivers. Drivers were able to identify only half of the high-risk sites as hazardous. Sites with a flat and straight road profile had a lower hazard perception compared to those with curved and slope road profile. High-risk sites situated in built-up areas were perceived less hazardous (OR = 0.58; 95%CI=0.51-0.68) compared to low-risk sites (OR = 2.04; 95%CI=1.51-2.74) with same road situation. Further, high-risk sites with vertical road signs were more likely to be perceived hazardous (OR = 2.75; 95%CI=2.38-3.16) than low-risk sites (OR = 0.50; 95%CI=0.34-0.72) with such signs. Conclusion: This thesis illustrates how innovative yet simple epidemiological methods can be useful in assessing the injury burden and specific risk factors in LMICs. These countries face a high burden of interurban road injuries, mostly under-reported in police data. A reliable and accurate injury surveillance system is needed in these countries. Moreover, prevention policy can be improved by better information transfer between road and police authorities regarding situational factors. Similarly, a monitoring system is required to examine the HWZ safety interventions in these countries. Lastly, interurban road safety can be improved by making roads self-explaining, especially by implementing low-cost interventions such as vertical signs at high-risk sites
Glatron, Sandrine. "L'évaluation des risques technologiques majeurs en milieu urbain : approche géographique : le cas de la distribution des carburants dans la région Ile-de-France." Paris 1, 1997. http://www.theses.fr/1997PA010684.
Повний текст джерелаTechnological hasards have now a societal dimension, as shown by the necessity for the town planner to consider them, since the French law of 1987. During the elaboration of urban plans, local (Land of urban, local (Land Use Plan) or regional, the technological hazards must be taken into account. An original assesment method is built, using this legal constraint - the control of urban development around dangerous industrial sites. It consists in counting the potential damages wihin the area concerned by the consequences of an accident. This area is calculated for the most serious accident, called "penalizing" accident, because of the determinist assessment method we use in France. This assessment doesn't concern only the dangerous plants. It is implemented for the hole steps of an industrial branch, including the transport. Flows are very closely linked to the spatial firm organisation. The assessing method elaborated takes account of this close link, when it proposes a common evaluation for plant - hazards and transport - hazards. It allows the verification of the following hypothesis : there might be risks transferts from the plant to the dangerous substances transports if the georgraphy of the firm was changed, as the storage or production plant is localized elsewhere. The evaluation method is undertaken for the end of the petroleum industrial branch, i. E. Storage and retail road distribution of fuel oils, in the Ile-de-France Region. It uses the spatial analysis described in the land use map worked out by the IAURIF (Town Planning Institut of the Ile-de-France Region)
Foucher, Karine. "Principe de précaution et risque sanitaire : recherche sur l'encadrement juridique de l'incertitude scientifique." Nantes, 2000. http://www.theses.fr/2000NANT4026.
Повний текст джерелаThe emergence of the precautionary principle is the outcome, due to the advancement of scientific knowledge, of an awareness of the limitations of the preventionary principle. µAfter it has been acknowledged in the field of environnemental protection, the precautionary principle is moreover liable to apply in the field of public health. Its aims is to prevent risks of typically uncertain, grevious and irreversible damage. Operating it does not require any new legal instruments, it only requires making use of the existing provisions about the prevention of technological risks (preliminary assessment and licence, compulsory follow up, limitations, measures of conservation) taking into account scientific uncertainty. Such steps taken to manage risks happen to be ample dimensions compared with wathever action could be taken according to preventionary principle. The juridical implications of the precautionary principle fall into two categories, wether the risk is managd in a permissive or in a conservatoryway. The point of this approach is so show that the precautionary principle is a principle for action intented to apply of the various stages of decision making. When one considers that distinction to check off the existing or potential means of the taking uncertainty into account in law, substantial presence of that principole can no doubt be traced in law. Its formal consecration does not lead the to a break with existing law. On the contrary, it allows strengthening the precautionary principle widely developed in law, together with is acknowledgement as a juridical principle
Gorand, Olivier. "Création d'une base de données informatique de toxicologie industrielle dans la centrale nucléaire du Blayais." Bordeaux 2, 1998. http://www.theses.fr/1998BOR23069.
Повний текст джерелаDestercke, Sébastien. "Représentation et combinaison d'informations incertaines : nouveaux résultats avec applications aux études de sûreté." Toulouse 3, 2008. http://www.theses.fr/2008TOU30179.
Повний текст джерелаIt often happens that the value of some parameters or variables of a system are imperfectly known, either because of the variability of the modelled phenomena, or because the available information is imprecise or incomplete. Classical probability theory is usually used to treat these uncertainties. However, recent years have witnessed the appearance of arguments pointing to the conclusion that classical probabilities are inadequate to handle imprecise or incomplete information. Other frameworks have thus been proposed to address this problem: the three main are probability sets, random sets and possibility theory. There are many open questions concerning uncertainty treatment within these frameworks. More precisely, it is necessary to build bridges between these three frameworks to advance toward a unified handling of uncertainty. Also, there is a need of practical methods to treat information, as using these framerowks can be computationally costly. In this work, we propose some answers to these two needs for a set of commonly encountered problems. In particular, we focus on the problems of: -Uncertainty representation -Fusion and evaluation of multiple source information -Independence modelling The aim being to give tools (both of theoretical and practical nature) to treat uncertainty. Some tools are then applied to some problems related to nuclear safety issues
Beerli, Monique J. "Saving the saviors : an international political sociology of the professionalization of humanitarian security." Thesis, Paris, Institut d'études politiques, 2017. http://www.theses.fr/2017IEPP0033.
Повний текст джерелаIn recent years, a dominant discourse has emerged asserting that humanitarian work has become a dangerous profession. In response to growing insecurity in the field, humanitarian organizations have developed new security policies to better protect humanitarian staff and infrastructures. Drawing from Andrew Abbott’s historical sociology of professions and Pierre Bourdieu’s social theory of power, this thesis proposes an international political sociology of the professionalization of humanitarian security. To address the shortcomings of normative-functionalist explanations and poststructuralist critiques of humanitarian security, this thesis examines the conditions of possibility fostering the emergence of a microcosm of humanitarian security professionals. As a consequence of this transformation in the division of humanitarian labor, humanitarian organizations now classify some of world’s neediest populations as beyond the limits of reasonable sacrifice. In the production of this exclusion, humanitarian actors reconstruct “populations in need” as “dangerous populations.” By weighing the cost of the loss of a “humanitarian life” against the potential value of saving the lives of needy others, humanitarian actors contribute to the intensification of global divides in their quest for a common humanity. In sum, the imposition of security as a humanitarian logic of practice is analyzed as a driving force of the inversion of the humanitarian imperative to save lives and act in defense of a shared humanity. Contributing to debates on humanitarian security, this thesis also advances the study of international organizations, security, and transnational power elites
Kooli, Maha. "Analysing and supporting the reliability decision-making process in computing systems with a reliability evaluation framework." Thesis, Montpellier, 2016. http://www.theses.fr/2016MONTT252/document.
Повний текст джерелаReliability has become an important design aspect for computing systems due to the aggressive technology miniaturization and the uninterrupted performance that introduce a large set of failure sources for hardware components. The hardware system can be affected by faults caused by physical manufacturing defects or environmental perturbations such as electromagnetic interference, external radiations, or high-energy neutrons from cosmic rays and alpha particles.For embedded systems and systems used in safety critical fields such as avionic, aerospace and transportation, the presence of these faults can damage their components and leads to catastrophic failures. Investigating new methods to evaluate the system reliability helps designers to understand the effects of faults on the system, and thus to develop reliable and dependable products. Depending on the design phase of the system, the development of reliability evaluation methods can save the design costs and efforts, and will positively impact product time-to-market.The main objective of this thesis is to develop new techniques to evaluate the overall reliability of complex computing system running a software. The evaluation targets faults leading to soft errors. These faults can propagate through the different structures composing the full system. They can be masked during this propagation either at the technological or at the architectural level. When a fault reaches the software layer of the system, it can corrupt data, instructions or the control flow. These errors may impact the correct software execution by producing erroneous results or prevent the execution of the application leading to abnormal termination or application hang.In this thesis, the reliability of the different software components is analyzed at different levels of the system (depending on the design phase), emphasizing the role that the interaction between hardware and software plays in the overall system. Then, the reliability of the system is evaluated via a flexible, fast, and accurate evaluation framework. Finally, the reliability decision-making process in computing systems is comprehensively supported with the developed framework (methodology and tools)
Rifi, Mouna. "Modélisation et Analyse des Réseaux Complexes : application à la sûreté nucléaire." Thesis, Sorbonne Paris Cité, 2019. http://www.theses.fr/2019USPCD049.
Повний текст джерелаThis work aims to propose an adequate graph modeling approach for nuclear safety accident systems and sequences.These systems and sequences come from "Probabilistic Safety Analysis" (PSA) which is an exhaustive analysis of all possible accident scenarios, to estimate their probabilities of occurrence (by grouping them by families) and the associated consequences.Then, an analysis of the resulting networks is performed by network centrality measures. A first application consists on predicting the nuclear Risk Increase Factor, which is a PSA importance factor, using supervised learning algorithms : classification tree methods, logistic regression and ensemble learning methods, on un balanced data. Furthermore, a new synthetic centrality coefficient and a similarity measure are developed to compare the networks structures and their topological characteristics, based on their centrality vectors interdependencies. This new approach uses statistical techniques (sampling,correlation and homogeneity).The relevance and appreciation of this new measure of similarity are validated on the clustering of most popular theoretical graphs and on the prediction of the type of these graphs. Finally, an application of this approach has been conducted for the clustering of nuclear safety systems networks
Denisse, Munante. "Une approche basée sur l'Ingénierie Dirigée par les Modèles pour identifier, concevoir et évaluer des aspects de sécurité." Thesis, Pau, 2014. http://www.theses.fr/2014PAUU3035/document.
Повний текст джерелаSoftware engineering is an interdisciplinary approach aiming to formalize the development of systems. This approach begins with defining system requirements and then continues with defining the design, implementation and validation of systems. Historically, systems were isolated and often based on proprietary technologies. Todays, computer systems are interconnected using Internet and standard technologies by promoting interoperability. In spite of undeniable contributions, these changes engender new risks of computer vulnerabilities/attacks. To cope with these risks, information security has improved to implement more or less reliable counter-measures. This thesis is situated at the intersection/crossroads of the software engineering and the information security. It aims to propose an approach that integrates these two fields in a collaborative and complementary manner. Although both fields are closely related, there are few approaches that integrate security aspects into software engineering process, much less from engineering requirements, which allow the assessment of security policies from a high level of abstraction. Hence, this thesis makes a contribution in this area. Therefore, in this thesis, we propose an approach based on MDE (Model-Driven Engineering) and MDA (Model Driven Architecture) which integrates software engineering and information security using models. This approach allows to identify, to design and to assess security aspects in the stages of the system development in order to obtain secure systems
Hasrouny, Hamssa. "Gestion de confiance et solutions de sécurité pour les réseaux véhiculaires." Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0001/document.
Повний текст джерелаVANETs (Vehicular Ad-hoc Networks) consist of vehicles capable of exchanging information by radio to improve road safety (alerts in case of accidents or in case of abnormal slowdowns, collaborative driving…) or allow internet access for passengers (collaborative networks, infotainment, etc.). Road safety messages exchanged between vehicles may be falsified or eliminated by malicious entities in order to cause accidents and endanger people life. In this thesis, we focus on defining, designing and evaluating a security solution for V2V communications in VANET, to ensure a secure communication and a good level of confidence between the different participating vehicles. Adopting a group-based model, we consider the Trustworthiness evaluation of vehicles participating in VANET and we develop a Trust Model to analyze the behavior of the vehicles in the group while preserving the privacy of the participants and maintaining low network overhead. We then propose a hierarchical and modular framework for Misbehavior Detection and Revocation Management
Nedellec, Vincent. "Méthodes quantitatives pour évaluer les risques non mutagènes des substances chimiques : Application au cas du chlordécone." Thesis, Paris, CNAM, 2015. http://www.theses.fr/2015CNAM0997/document.
Повний текст джерелаRisk assessment of chemicals uses for non-mutagenic effects a threshold dose without effect. The aim is to develop a risk assessment framework that allows quantification of non-mutagenic risks. It is inspired by the approach used for genotoxic carcinogens. The added value for safety decision making is shown on the case of chlordecone exposure in Guadeloupe. The official assessment is 1 to 3% of the population are exposed above the threshold (kidney damage). No one has quantified the risks when the threshold is exceeded. However, several million euros (M€) are invested annually for the prevention of exposure to chlordecone in Guadeloupe.The study is based only on published data available in 2013. The analysis of modes of action will identify the possible effects of chlordecone at chronicle low doses. Multidoses experimental studies or epidemiological studies provide data to derive exposure-response functions (ERF). The internal exposure data (blood chlordecone concentration) are available for Guadeloupe before and after the introduction in 2003 of preventive actions. The external exposure data are available only after 2003. Risks, estimated with exposures and ERF, are converted into impacts through the number of people exposed. The impacts are monetized via DALYs and VOLY.Four effects of chlordecone can occur at chronic low dose: prostate and liver cancers, kidney damages and cognitive development impairments. Without threshold and with internal exposure data, the estimated numbers of deaths from liver cancer are respectively before and after 2003: 5.4 /year and 2.0 /year. That is 3.4 deaths avoided per year by reducing exposure. For prostate cancer there are respectively 2.8 and 1.0 /yr (gain: 1.8 /yr) and for kidney damages 0.10 and 0.04 /yr (gain: 0.06 /yr). Loss of IQ points are 1 173/yr and 1 003 /yr (gain = 168 pt./yr). Before 2003, the total annual cost of these impacts is 31.8 million €2006 [10.6 to 64.3]. Impacts on cognitive development account for 62% of the total, liver cancer 27%, prostate cancer 11% and kidney damage 0.6%. After 2003, the cost of impacts is 21.3 M€/yr [5.8 to 42.8]. The benefits due to the reduction of exposures (avoided impacts) are 10.5 M€/yr [4.8 to 21.5]. Compared to annual spending estimated at 3.25 M€/yr, the annual benefit is three times higher. Including a threshold dose in the model do not significantly change the results. Use of the external exposure data, dramatically decreased the costs of impacts down to 4% of the costs estimated with internal exposures data. A sensitivity analysis with Monte Carlo simulation show that the "exposure" variable is the one that most influences the results.This work is the first to consider a quantitative assessment of health risks scenario without threshold, which is more and more often recommended for endocrine disrupters. It is also the first to monetize health impacts of chlordecone in Guadeloupe. This approach proves fruitful of useful information for decision making. It enables to compare basic options such as whether or not a threshold should be used in the model, taking into account any external or internal exposures. It also allows a comparison of the cost of preventive actions with the health benefits they generate. The results obtained facilitate the prioritization of actions for health safety. This quantitative approach is recommended for environmental factors to which are already exposed populations. Actions for reducing exposure to chlordecone in Guadeloupe are justified and efficient in terms of social cost. Epidemiological surveys to study the role of chlordecone in diseases that could not been taken into account for lack of knowledge (adult neurotoxicity, autoimmune diseases, and other developmental effects) would be needed. It would be useful to provide mechanistic studies before epidemiological studies implementation. Extend follow-up of the TIMOUN cohort could reduce uncertainty about cognitive development
Debure, Antoine. "Crédibiliser pour expertiser : le Codex Alimentarius et les comités d'experts FAO-OMS dans la production réglementaire internationale de sécurité sanitaire des aliments." Paris, EHESS, 2012. http://www.theses.fr/2012EHES0054.
Повний текст джерелаThe scientific expertise, produced for the Codex Alimentarius by international committees of the FAO and the WHO, has a growing central role in the regulation of food production and international trade. It is this role and the questions arising from the relation between science and policy that this research work explores by analyzing the “credibilization processes” of expertise. The theoretical framework articulates Sociology of organizations, Sociology of science as well as central concepts of political sociology. The relationship between science and policy is known to be unstable. The FAO-WHO’s expertise is even more unstable with regard to its participation in the international normalization/standardization which has an enforceable power over national regulation systems. This dissertation demonstrates that the “credibilization processes” in which different actors are involved (experts, institutions, regulators, industries, consumers…) enables to reduce this instability. By engaging in these processes, actors obtain the resources to negotiate their position in the relationship to their advantage, and are able to avoid criticism at the same time. We consider the “credibilization processes” as a set of strategies aiming at strengthening “the subject’s ability to state and to take action”, a notion that exceeds the limits of “authority” and “legitimacy”, other central notions. Processes are grasped by analyzing strategies and behavior of institutions as well as experts in their transnational networks and in the course of FAO-WHO collective expertise. The “credibilization processes” rest upon three interdependent dimensions: a procedural credibilization, a collaborative credibilization and a deliberative credibilization. This research illustrates an expertise that is inseparable from the “credibilization processes”. The credibilization is both the result of interdependencies along the expertise, and a prerequisite for interdependencies to exist in order to produce an expertise. The “credibilization processes” analysis unveils a plural expertise, more specifically in between a “traditional” model and a “precautionary” model. Finally, this dissertation questions the relevance of maintaining science and policy separated; a separation always reasserted by national and international authorities, but remaining however implicitly adjusted in practice
Martinet, Simon. "Estimation in-situ des facteurs d’émission des polluants du trafic routier." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSET006.
Повний текст джерелаUrban air pollution is a major issue for human health and the environment. Road traffic is the main source of pollution in urban areas and contributes significantly to air pollution in these areas despite improvements in pollution control technologies and engines. To measure and improve knowledge of pollutant emissions from road vehicles, different methods exist, each with its own advantages and limitations. For example, measurements on a test bench make it possible to study vehicle emissions according to their technology and with good reproducibility of test conditions. However, this approach remains limited, particularly for the representativeness of vehicle fleet emissions under real operating conditions. The limited knowledge of emissions of unregulated pollutants, such as BTEX, C9-22 alkanes, carbonyl compounds, particulate matter and soot carbon, which have adverse effects on health and the environment and are rarely measured due to the complexity of metrology, is a second area for further study of traffic emissions. The objective of this work is to estimate in-situ emission factors for unregulated pollutants from road traffic, under real vehicle traffic conditions and for fleets whose composition is precisely characterized. For this purpose, the work of this thesis has made it possible to develop and implement methodologies for in-situ measurement, in urban areas, of unregulated pollutant emissions from road traffic, and to estimate emission factors based on measurements made at different sites (open roadside site and confined site). These emission factors are established for unregulated pollutants, and for a precisely defined actual vehicle fleet (detailed knowledge of the composition of the vehicle fleet in use and local traffic conditions). The emission factors thus determined in-situ are compared with those derived from bench measurements in order to verify their consistency and analyse them according to the different measurement sites and the impact of the composition of the fleet on pollutant emissions. Three in-situ measurement campaigns were carried out, two roadside in urban areas (open sites) and one in a tunnel near an urban area (confined site). The concentrations of the targeted pollutants measured at these three sites, as well as the different fleet compositions and traffic conditions identified, were used to estimate emission factors per vehicle or for the entire fleet
Bennaceur, Mokhtar Walid. "Formal models for safety analysis of a Data Center system." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLV078/document.
Повний текст джерелаA Data Center (DC) is a building whose purpose is to host IT devices to provide different internet services. To ensure constant operation of these devices, energy is provided by the electrical system, and to keep them at a constant temperature, a cooling system is necessary. Each of these needs must be ensured continuously, because the consequence of breakdown of one of them leads to an unavailability of the whole DC system, and this can be fatal for a company.In our Knowledge, there exists no safety and performance studies’, taking into account the whole DC system with the different interactions between its sub-systems. The existing analysis studies are partial and focus only on one sub-system, sometimes two. The main objective of this thesis is to contribute to the safety analysis of a DC system. To achieve this purpose, we study, first, each DC sub-system (electrical, thermal and network) separately, in order to define their characteristics. Each DC sub-system is a production system and consists of combinations of components that transform entrance supplies (energy for the electrical system, air flow for the thermal one, and packets for the network one) into exits, which can be internet services. Currently the existing safety analysis methods for these kinds of systems are inadequate, because the safety analysis must take into account not only the internal state of each component, but also the different production flows circulating between components. In this thesis, we consider a new modeling methodology called Production Trees (PT) which allows modeling the relationship between the components of a system with a particular attention to the flows circulating between these components.The PT modeling technique allows dealing with one kind of flow at once. Thus its application on the electrical sub-system is suitable, because there is only one kind of flows (the electric current). However, when there are dependencies between sub-systems, as in thermal and network sub-systems, different kinds of flows need to be taken into account, making the application of the PT modeling technique inadequate. Therefore, we extend this technique to deal with dependencies between the different kinds of flows in the DC. Accordingly it is easy to assess the different safety indicators of the global DC system, taking into account the interactions between its sub-systems. Moreover we make some performance statistics. We validate the results of our approach by comparing them to those obtained by a simulation tool that we have implemented based on Queuing Network theory.So far, Production Trees models are not tool supported. Therefore we propose a solution method based on the Probability Distribution of Capacity (PDC) of flows circulating in the DC system. We implement also the PT model using the AltaRica 3.0 modeling language, and use its dedicated stochastic simulator to estimate the reliability indices of the system. This is very important to compare and validate the obtained results with our assessment method. In parallel, we develop a tool which implements the PT solution algorithm with an interactive graphical interface, which allows creating, editing and analyzing PT models. The tool allows also displaying the results, and generates an AltaRica code, which can be subsequently analyzed using the stochastic simulator of AltaRica 3.0 tool
Lone, Sang Fernand. "Protection des systèmes informatiques contre les attaques par entrées-sorties." Phd thesis, INSA de Toulouse, 2012. http://tel.archives-ouvertes.fr/tel-00863020.
Повний текст джерелаWang, Tairan. "Decision making and modelling uncertainty for the multi-criteria analysis of complex energy systems." Thesis, Châtenay-Malabry, Ecole centrale de Paris, 2015. http://www.theses.fr/2015ECAP0036/document.
Повний текст джерелаThis Ph. D. work addresses the vulnerability analysis of safety-critical systems (e.g., nuclear power plants) within a framework that combines the disciplines of risk analysis and multi-criteria decision-making. The scientific contribution follows four directions: (i) a quantitative hierarchical model is developed to characterize the susceptibility of safety-critical systems to multiple types of hazard, within the needed `all-hazard' view of the problem currently emerging in the risk analysis field; (ii) the quantitative assessment of vulnerability is tackled by an empirical classification framework: to this aim, a model, relying on the Majority Rule Sorting (MR-Sort) Method, typically used in the decision analysis field, is built on the basis of a (limited-size) set of data representing (a priori-known) vulnerability classification examples; (iii) three different approaches (namely, a model-retrieval-based method, the Bootstrap method and the leave-one-out cross-validation technique) are developed and applied to provide a quantitative assessment of the performance of the classification model (in terms of accuracy and confidence in the assignments), accounting for the uncertainty introduced into the analysis by the empirical construction of the vulnerability model; (iv) on the basis of the models developed, an inverse classification problem is solved to identify a set of protective actions which effectively reduce the level of vulnerability of the critical system under consideration. Two approaches are developed to this aim: the former is based on a novel sensitivity indicator, the latter on optimization.Applications on fictitious and real case studies in the nuclear power plant risk field demonstrate the effectiveness of the proposed methodology