- document
-
van Rest, J.H.C. (author), Boonstra, D. (author), Everts, M.H. (author), van Rijn, M. (author), van Paassen, R.J.G. (author)The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these privacy risks. In this vision paper, we...bookPart 2014
- document
-
Schotanus, H.A. (author), Hartog, T. (author), Hut, D.H. (author), Boonstra, D. (author)Military communication infrastructures are often deployed as stand-alone information systems operating at the System High mode. Network-Enabled Capabilities (NEC) and combined military operations lead to new requirements for information management and sharing which current communication architectures cannot deliver. This paper informs...conference paper 2011
- document
-
Boonstra, D. (author), Schotanus, H.A. (author), Verkoelen, C.A.A. (author), Smulders, A.C.M. (author)Effective and efficient cooperation within future military operations increasingly requires the sharing of information among coalition partners and other organisations, as envisioned by the NATO Network-Enabled Capabilities (NNEC) study. It is therefore necessary that military communication infrastructures can be interconnected to facilitate the...conference paper 2011
- document
-
Schotanus, H.A. (author), Boonstra, D. (author), Broenink, E.G. (author)The introduction of network enabled capabilities (NEC) changed the way defence organisations look at their IT infrastructure. Finding the right balance between security and duty-to-share has proven to be a difficult challenge. The situations are complex and may lead to high security requirements that eventually result in unmanageable...conference paper 2011
- document
-
Boonstra, D. (author), Hartog, T. (author), Schotanus, H.A. (author), Verkoelen, C.A.A. (author)The NATO Network-Enabled Capability (NNEC) study envisions effective and efficient cooperation among the coalition partners in missions. This requires information sharing and efficient deployment of IT assets. Current military communication infrastructures are mostly deployed as stand-alone networked information systems operating at the System...conference paper 2011