- document
-
Ellens, W. (author), Zuraniewski, P.W. (author), Sperotto, A. (author), Schotanus, H.A. (author), Mandjes, M. (author), Meeuwissen, H.B. (author)DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security breach can be misused for activities like free web browsing, but also for command & control traffic or cyber espionage, thus motivating the search for effective automated DNS tunnel detection techniques. In this paper we develop such a technique,...bookPart 2013
- document
-
Schotanus, H.A. (author), Hartog, T. (author), Verkoelen, C.A.A. (author)Multi-Level Security (MLS) is often viewed as the holy grail of information security, especially in those environments where information of different classifications is being processed. In this paper we argue that MLS cannot facilitate the right balance between need-to-protect and duty-to-share as required for a Network Enabled Capability (NEC)...conference paper 2012
- document
-
Schotanus, H.A. (author), Hartog, T. (author), Hut, D.H. (author), Boonstra, D. (author)Military communication infrastructures are often deployed as stand-alone information systems operating at the System High mode. Network-Enabled Capabilities (NEC) and combined military operations lead to new requirements for information management and sharing which current communication architectures cannot deliver. This paper informs...conference paper 2011
- document
-
Boonstra, D. (author), Schotanus, H.A. (author), Verkoelen, C.A.A. (author), Smulders, A.C.M. (author)Effective and efficient cooperation within future military operations increasingly requires the sharing of information among coalition partners and other organisations, as envisioned by the NATO Network-Enabled Capabilities (NNEC) study. It is therefore necessary that military communication infrastructures can be interconnected to facilitate the...conference paper 2011
- document
-
Schotanus, H.A. (author), Boonstra, D. (author), Broenink, E.G. (author)The introduction of network enabled capabilities (NEC) changed the way defence organisations look at their IT infrastructure. Finding the right balance between security and duty-to-share has proven to be a difficult challenge. The situations are complex and may lead to high security requirements that eventually result in unmanageable...conference paper 2011
- document
-
Boonstra, D. (author), Hartog, T. (author), Schotanus, H.A. (author), Verkoelen, C.A.A. (author)The NATO Network-Enabled Capability (NNEC) study envisions effective and efficient cooperation among the coalition partners in missions. This requires information sharing and efficient deployment of IT assets. Current military communication infrastructures are mostly deployed as stand-alone networked information systems operating at the System...conference paper 2011
- document
-
Boen-Leo, M.S.A. (author), Hartog, T. (author), Holtzer, A.C.G. (author), Schotanus, H.A. (author), Smets, R.C.J. (author), Tijmes, M.R. (author)Dit whitepaper beschrijft de derde meting in het kader van IPv6 monitoring in Nederland. Eerder zijn de Nulmeting2 en Tweede Meting3 gepubliceerd. In de tweede helft van 2011 zal nog een vierde meting gepubliceerd worden. Uit de vorige metingen is gebleken dat IPv6 bewustzijn toeneemt, maar dat het nog op weinig plekken daadwerkelijk is...other 2011
- document
- Boen-Leo, M.S.A. (author), Holtzer, A.C.G. (author), Schotanus, H.A. (author), Smets, R.C.J. (author), Tijmes, M.R. (author) other 2011
- document
-
TNO Informatie- en communicatietechnologie (author), Hartog, T. (author), Schotanus, H.A. (author), Verkoelen, C.A.A. (author)In current practice military communication infrastructures are deployed as stand-alone networked information systems. Network-Enabled Capabilities (NEC) and combined military operations lead to new requirements which current communication architectures cannot deliver. This paper informs IT architects, information architects and security...conference paper 2010