{"title":"Risque d’explosion de gaz - Prévention et protection","authors":"Jean-Louis Gustin","doi":"10.51257/a-v1-se5021","DOIUrl":"https://doi.org/10.51257/a-v1-se5021","url":null,"abstract":"La prevention des explosions de gaz repose sur la maitrise de la composition des phases gazeuses en dehors du domaine de composition inflammable et sur l’elimination des sources d’inflammation. La protection des enceintes contre les effets des explosions de gaz repose sur l’installation d’events d’explosion permettant de reduire la surpression d’explosion a une valeur compatible avec la resistance mecanique des installations. L’utilisation de suppresseurs d’explosions et de vannes de sectionnement rapide est egalement envisageable pour cela. Les techniques permettant la maitrise du risque d’explosion de gaz et leur evolution recente sont exposees dans cet article.","PeriodicalId":325334,"journal":{"name":"Sécurité et gestion des risques","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123002602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sûreté dans l’industrie - Transport et logistique","authors":"Philippe Gagnaire","doi":"10.51257/a-v1-se1220","DOIUrl":"https://doi.org/10.51257/a-v1-se1220","url":null,"abstract":"","PeriodicalId":325334,"journal":{"name":"Sécurité et gestion des risques","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121874443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Méthode PDS","authors":"Olivier Iddir","doi":"10.51257/a-v1-se4077","DOIUrl":"https://doi.org/10.51257/a-v1-se4077","url":null,"abstract":"","PeriodicalId":325334,"journal":{"name":"Sécurité et gestion des risques","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122529021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Évaluer les risques chimiques dans le cadre de la pénibilité","authors":"Nicolas Kiefer","doi":"10.51257/f-1580","DOIUrl":"https://doi.org/10.51257/f-1580","url":null,"abstract":"Il manquait, a l’evaluation de la penibilite, une grille de lecture permettant de determiner de maniere univoque les situations d’exposition aux agents chimiques dangereux. Dans le contexte de l’entree en vigueur des dix derniers facteurs de penibilite le 1 er juillet 2016, cette fiche fait le point sur l’arrete du 30 decembre 2015 et explique comment l’appliquer.","PeriodicalId":325334,"journal":{"name":"Sécurité et gestion des risques","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131071996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Méthodes d’analyse de la vulnérabilité des sites industriels","authors":"Samantha LIM THIEBOT","doi":"10.51257/a-v1-se1212","DOIUrl":"https://doi.org/10.51257/a-v1-se1212","url":null,"abstract":"","PeriodicalId":325334,"journal":{"name":"Sécurité et gestion des risques","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123183213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risque d’explosion de gaz - Inflammabilité des gaz et des vapeurs","authors":"Jean-Louis Gustin","doi":"10.51257/a-v2-se5020","DOIUrl":"https://doi.org/10.51257/a-v2-se5020","url":null,"abstract":"","PeriodicalId":325334,"journal":{"name":"Sécurité et gestion des risques","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121177766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Méthode AP913 de maintenance basée sur la fiabilité des centrales nucléaires américaines","authors":"G. Zwingelstein","doi":"10.51257/a-v1-se1671","DOIUrl":"https://doi.org/10.51257/a-v1-se1671","url":null,"abstract":"Cet article presente le processus «Equipment Reliability Process Description AP913» developpe par l’INPO (Institute of Nuclear Power Operations) aux USA. L’AP913 fournit une integration des methodes de fiabilite appliquees aux equipements pour maintenir de facon efficace des niveaux eleves de surete et de disponibilite des centrales nucleaires. Apres un rappel des origines et des definitions, les etapes de l’organigramme de la procedure AP913 font l’objet de developpements. Le systeme de controle chimique volumetrique (RCV) d’une centrale a eau pressurisee illustre cette demarche. La conclusion fournit les recommandations et les evolutions en cours pour la mise en œuvre de l’AP913.","PeriodicalId":325334,"journal":{"name":"Sécurité et gestion des risques","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126972555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sécurité informatique pour la gestion des risques - Application aux systèmes scientifiques et techniques","authors":"F. Vallée","doi":"10.51257/a-v1-se2501","DOIUrl":"https://doi.org/10.51257/a-v1-se2501","url":null,"abstract":"Les systemes a haut niveau de securite, de type embarques ou de controle-commande, sont presents dans tous les secteurs d’activite. Leur securite fonctionnelle doit les proteger contre des dangers lies aux defaillances du materiel ou du logiciel, ou aux erreurs humaines involontaires. L’analyse de risques permet de determiner la criticite du systeme pour chacun de ces dangers. La diversite des systemes programmes impose l’utilisation de techniques specifiques pour construire leur surete de fonctionnement. Cet article presente les methodes d’AMDEC, de quantification de fiabilite et d’etude du facteur humain utilisees pour analyser la securite des systemes programmes. Un panorama des principales normes employees par secteur d’activite et un resume des pratiques industrielles en vigueur est donne.","PeriodicalId":325334,"journal":{"name":"Sécurité et gestion des risques","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122318283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sécurité informatique pour la gestion des risques - Application aux systèmes d’information","authors":"F. Vallée","doi":"10.51257/a-v3-se2500","DOIUrl":"https://doi.org/10.51257/a-v3-se2500","url":null,"abstract":"Les systemes d’information sont omnipresents de nos jours dans toutes les entreprises. La securite informatique de ces systemes doit les proteger contre de nombreuses menaces de diverses origines. L’analyse de risques permet de determiner, en fonction de la vulnerabilite du systeme, sa criticite pour chacune de ces menaces. Elle permet ensuite de proposer les solutions necessaires et suffisantes pour reduire les risques a un niveau residuel acceptable. Apres une introduction sur les risques informatiques en general, cet article se preoccupe plus particulierement des systemes d’information et presente les methodes d’analyse de risques et quelques solutions en reduction de risques. En conclusion, un panorama des principales normes employees en cybersecurite est donne.","PeriodicalId":325334,"journal":{"name":"Sécurité et gestion des risques","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124185631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Méthode de maintenance basée sur la fiabilité de la MSG-3","authors":"G. Zwingelstein","doi":"10.51257/a-v1-se1669","DOIUrl":"https://doi.org/10.51257/a-v1-se1669","url":null,"abstract":"","PeriodicalId":325334,"journal":{"name":"Sécurité et gestion des risques","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126990076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}