\relax 
\catcode`:\active
\catcode`;\active
\catcode`!\active
\catcode`?\active
\select@language{french}
\@writefile{toc}{\select@language{french}}
\@writefile{lof}{\select@language{french}}
\@writefile{lot}{\select@language{french}}
\@writefile{toc}{\contentsline {chapter}{\numberline {1}cahier des charges fonctionnelles}{5}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {1.1}Pr\IeC {\'e}sentation g\IeC {\'e}n\IeC {\'e}rale du probl\IeC {\`e}me}{5}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.1.1}Introduction}{5}}
\@writefile{toc}{\contentsline {subsubsection}{Rappel du contexte}{5}}
\@writefile{toc}{\contentsline {paragraph}{Ev\IeC {\`e}nements d\IeC {\'e}clencheurs \IeC {\`a} l'origine de l'\IeC {\'e}tude}{5}}
\@writefile{toc}{\contentsline {paragraph}{Description succinte de l'\IeC {\'e}tude}{5}}
\@writefile{toc}{\contentsline {subsubsection}{La port\IeC {\'e}e et les limites de l'\IeC {\'e}tude}{5}}
\@writefile{toc}{\contentsline {paragraph}{Positionnement de l'\IeC {\'e}tude par rapport aux objectifs de l'entreprise}{5}}
\@writefile{toc}{\contentsline {paragraph}{Les impacts de l'\IeC {\'e}tude}{5}}
\@writefile{toc}{\contentsline {subsubsection}{Les contours du projet}{6}}
\@writefile{toc}{\contentsline {paragraph}{D\IeC {\'e}finitions des utilisateurs}{6}}
\@writefile{toc}{\contentsline {paragraph}{Expos\IeC {\'e} du contenu}{6}}
\@writefile{toc}{\contentsline {paragraph}{Exigence de qualit\IeC {\'e}}{6}}
\@writefile{toc}{\contentsline {subsubsection}{L'organisation}{6}}
\@writefile{toc}{\contentsline {paragraph}{Intervenants}{6}}
\@writefile{toc}{\contentsline {subsubsection}{Le calendrier}{7}}
\@writefile{toc}{\contentsline {paragraph}{Les dates importantes \IeC {\`a} venir ou pass\IeC {\'e}es}{7}}
\@writefile{toc}{\contentsline {paragraph}{Phase du projet}{7}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.1.2}Projet}{8}}
\@writefile{toc}{\contentsline {subsubsection}{Finalit\IeC {\'e}s, objectif, et p\IeC {\'e}rim\IeC {\`e}tre du projet}{8}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.1.3}Contexte}{8}}
\@writefile{toc}{\contentsline {subsubsection}{Etude d\IeC {\'e}j\IeC {\`a} effectu\IeC {\'e}e}{8}}
\@writefile{toc}{\contentsline {subsubsection}{Situation du projet dans le syst\IeC {\`e}me existant}{8}}
\@writefile{toc}{\contentsline {subsubsection}{Caract\IeC {\`e}re confidentiel}{8}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.1.4}Enonc\IeC {\'e} du besoin}{8}}
\@writefile{toc}{\contentsline {section}{\numberline {1.2}Expression fonctionnelle du besoin}{10}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}Fonctions de service et de contrainte}{10}}
\@writefile{toc}{\contentsline {subsubsection}{Mod\IeC {\`e}le g\IeC {\'e}n\IeC {\'e}ral des fonctions}{10}}
\@writefile{toc}{\contentsline {paragraph}{Diagramme d'enchainement des fonctions}{10}}
\@writefile{toc}{\contentsline {subsubsection}{Principales r\IeC {\`e}gles de gestion}{12}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}Crit\IeC {\`e}res d'appr\IeC {\'e}ciation}{14}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.3}Niveaux des crit\IeC {\`e}res d'appr\IeC {\'e}ciation et ce qui les caract\IeC {\'e}rise}{14}}
\@writefile{toc}{\contentsline {subsubsection}{Niveaux dont l'obtention est impos\IeC {\'e}e}{14}}
\@writefile{toc}{\contentsline {subsubsection}{Niveaux souhait\IeC {\'e}s mais r\IeC {\'e}visables}{14}}
\@writefile{toc}{\contentsline {section}{\numberline {1.3}Cadre de r\IeC {\'e}ponse}{16}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.1}Pour chaque fonction}{16}}
\@writefile{toc}{\contentsline {subsubsection}{Part du prix attribu\IeC {\'e} \IeC {\`a} chaque fonction}{16}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.2}Pour l'ensemble du produit}{16}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.3}Reprise de l'existant}{17}}
\@writefile{toc}{\contentsline {subsubsection}{Indiquer les principes de reprise}{17}}
\@writefile{toc}{\contentsline {subsubsection}{D\IeC {\'e}crire le sc\IeC {\'e}nario g\IeC {\'e}n\IeC {\'e}ral de reprise}{18}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.4}Les flux}{18}}
\@writefile{toc}{\contentsline {subsubsection}{Sch\IeC {\'e}ma g\IeC {\'e}n\IeC {\'e}ral des flux}{18}}
\@writefile{toc}{\contentsline {subsubsection}{Descriptif des flux}{18}}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3.5}Organisation et profils-types}{19}}
\@writefile{toc}{\contentsline {subsubsection}{R\IeC {\'e}partition}{19}}
\@writefile{toc}{\contentsline {subsubsection}{Profils-types}{20}}
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Sp\IeC {\'e}cifications et R\IeC {\'e}alisation de l'application}{21}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Description de l'application}{21}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1.1}Fonctionnalit\IeC {\'e}s de l'application}{21}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1.2}Design de l'application}{21}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1.3}Solutions techniques retenues}{21}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1.4}Aspect s\IeC {\'e}curit\IeC {\'e}}{22}}
\@writefile{toc}{\contentsline {subsubsection}{Autorisation d'acces}{22}}
\@writefile{toc}{\contentsline {subsubsection}{Sauvegarde des donn\IeC {\'e}es}{22}}
\@writefile{toc}{\contentsline {subsubsection}{securite face aux actions malveillantes}{22}}
\@writefile{toc}{\contentsline {paragraph}{R\IeC {\'e}cup\IeC {\'e}ration non autoris\IeC {\'e}e d'un dump de la base de donn\IeC {\'e}es}{22}}
\@writefile{toc}{\contentsline {paragraph}{R\IeC {\'e}cup\IeC {\'e}ration non autoris\IeC {\'e}e d'une sauvegarde (fichiers de donn\IeC {\'e}es)}{23}}
\@writefile{toc}{\contentsline {paragraph}{Acc\IeC {\`e}s non autoris\IeC {\'e} \IeC {\`a} la base de donn\IeC {\'e}es}{23}}
\@writefile{toc}{\contentsline {paragraph}{Acc\IeC {\`e}s non autoris\IeC {\'e} aux fichiers de l'application sur le serveur}{23}}
\@writefile{toc}{\contentsline {paragraph}{Vol de session}{23}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1.5}Rubrique Aide}{23}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1.6}Sch\IeC {\'e}ma de la base de donn\IeC {\'e}e}{23}}
\@writefile{toc}{\contentsline {subsubsection}{utilisateur}{23}}
\@writefile{toc}{\contentsline {subsubsection}{exercice}{23}}
\@writefile{toc}{\contentsline {subsubsection}{etiquette}{24}}
\@writefile{toc}{\contentsline {subsubsection}{en-t\IeC {\^e}tes}{24}}
\@writefile{toc}{\contentsline {subsubsection}{fiches d'exercices}{24}}
\@writefile{toc}{\contentsline {subsubsection}{Groupe}{24}}
\@writefile{toc}{\contentsline {subsubsection}{cat\IeC {\'e}gorie fiche}{24}}
\@writefile{toc}{\contentsline {subsubsection}{exo-etiquette}{24}}
\@writefile{toc}{\contentsline {subsubsection}{Historique}{25}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1.7}Points d'entr\IeC {\'e}e de l'application}{25}}
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Diagramme de classe}{25}}
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Framework}{26}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Authentification}{26}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}Sauvegarde}{26}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.3}Cryptage}{26}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.4}Formulaire}{26}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.5}Gestion}{26}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.6}Common}{26}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.7}Sql}{27}}
\@writefile{toc}{\contentsline {section}{\numberline {2.4}Planning}{27}}
\@writefile{toc}{\contentsline {chapter}{\numberline {3}Conclusions}{28}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {3.1}conclusion g\IeC {\'e}n\IeC {\'e}rale}{28}}
\@writefile{toc}{\contentsline {section}{\numberline {3.2}conclusions personnelles}{28}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Arnaud}{28}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.2}Emilie}{28}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.3}Loic}{28}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.4}Ludovic}{29}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.5}Jordan}{29}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.6}Victor}{29}}
\@writefile{toc}{\contentsline {chapter}{\numberline {4}Mot de passe et login pour coder sous l'application}{30}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {chapter}{\numberline {5}Glossaire}{31}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
