Repository hosted by TU Delft Library

Home · Contact · About · Disclaimer ·
 

Search results also available in MS Excel format.

Showing 1 to 9 of 9 found. | Sort by date

1 Multi Level Security within Collective Mission Simulation Architectures
article 2009    
Author: Verkoelen, C.A.A. · Wymenga, R.R.
Keywords: Simulation
[PDF] [Abstract]

2 Snow Leopard cloud : A multi-national education training and experimentation cloud and its security challenges
article 2009    
Author: Cayirci, E. · Rong, C. · Huiskamp, W. · Verkoelen, C.A.A.
Keywords: Informatics · Exercise · Experiment · LVC · Military simulation · Multi-resolution simulation · Shared scenarios · Snow Leopard · Training · Cloud computing · Secure communication · Security
[Abstract]

3 Security Shift in Future Network Architectures
article 2010    
Author: Hartog, T. · Schotanus, H.A. · Verkoelen, C.A.A.
Keywords: Defence · Protected Core Networking · Trusted Operating Systems · Cryptography · Network Enabled Capabilities · Security · System High · Network Architecture · Communication Infrastructure · Information Security · Defence Research · Defence, Safety and Security · Communication & Information · ISEC - Information Security · TS - Technical Sciences
[PDF] [Abstract]

4 Multi-Level Security Cannot Realise NEC Objectives
article 2012    
Author: Schotanus, H.A. · Hartog, T. · Verkoelen, C.A.A.
Keywords: Informatics · MLS · MILS · Multi Level Security · Information security · Military operations · Classified information · Policies · Safety and Security · Defence, Safety and Security · Communication & Information · ISEC - Information Security · TS - Technical Sciences
[PDF] [Abstract]

5 Security in NATO collective mission training - Problem analysis and solutions
article 2012    
Author: Möller, B. · Croom-Johnson, S. · Hartog, T. · Huiskamp, W. · Verkoelen, C. · Jones, G. · Bennett, M.
Keywords: DSEEP · Information exchange · NATO · Requirements · Security · Simulation · Training · Defence Research · Defence, Safety and Security · Communication & Information ; Organisation · ISEC - Information Security ; MSG - Modelling Simulation & Gaming · TS - Technical Sciences ; BSS - Behavioural and Societal Sciences
[Abstract]

6 A methodology for the structured security analysis of interconnections
article 2011    
Author: Boonstra, D. · Schotanus, H.A. · Verkoelen, C.A.A. · Smulders, A.C.M.
Keywords: Assurance · Information Security · Interconnection · Methodology · Security · Threats · Trust · Safety and Security · Defence, Safety and Security · Communication & Information · ISEC - Information Security · TS - Technical Sciences
[Abstract]

7 A Secure NEC-enabling Architecture : Disentangling Infrastructure, Information and Security
article 2011    
Author: Boonstra, D. · Hartog, T. · Schotanus, H.A. · Verkoelen, C.A.A.
Keywords: Informatics · Network Enabled Capabilities · Security · System High · Network Architecture · Communication Infrastructure · Information Security · Protected Core Networking · Trusted Operating Systems · Cryptography · Labelling · Release mechanisms · Information Society · Communication & Information · ISEC - Information Security · TS - Technical Sciences
[PDF] [Abstract]

8 Towards Multi-Level Security for NATO Collective Mission Training – a White Paper
article 2011    
Author: Möller, B. · Karlsson, P. · Croom-Johnson, S. · Hartog, T. · Huiskamp, W. · Verkoelen, C.A.A. · Jones, G. · Nielsen, M.N. · Ståhl, I.
Keywords: Simulation · Simulation · Training · Interoperability · NATO · Security · Multi-level security · Communication & Information Organisation · ISEC - Information Security MSG - Modelling Simulation & Gaming · TS - Technical Sciences BSS - Behavioural and Societal Sciences
[PDF] [Abstract]

9 Security in transnational interoperable PPDR communications: Threats and requirements
article 2015    
Author: Ferrús, R. · Sallent, O. · Verkoelen, C. · Fransen, F. · Saijonmaa, J. · Olivieri, C. · Duits, M. · Galin, A. · Pangallo, F. · Modi, D.P.
Keywords: Emergency Services Communications · Inter-System Interconnection · Public Safety Communications · Risk · Security Requirements · TETRA · TETRAPOL · Threat · Vulnerability Analysis · Cost effectiveness · Disaster prevention · Disasters · Emergency services · Internet protocols · Network protocols · Risk assessment · Risks · Inter system · Public safety communications · Security requirements · TETRA · TETRAPOL · Threat · Vulnerability analysis · Network security · 2016 ICT · CSR - Cyber Security & Robustness · TS - Technical Sciences
[Abstract]

Search results also available in MS Excel format.

Showing 1 to 9 of 9 found. | Sort by date