U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Net-Centricity and Service-Oriented Architectures

NCJ Number
220995
Journal
Homeland Defense Journal Volume: 5 Issue: 8 Dated: August 2007 Pages: 44-46,48
Author(s)
Douglas Rhodes
Date Published
August 2007
Length
4 pages
Annotation
This article describes Project SafeEnterprise, whose goal is to provide security for "Net-Centricity" and service-oriented architectures, which are designed to eliminate compartmentalized military and intelligence operations and produce interconnected units that operate cohesively.
Abstract
Project SafeEnterprise is using a combination of available technologies to provide communications anywhere in the world in a secure environment, while maximizing operations under current bandwidth limitations on communications. It supports authentication, authorization, encryption, and access control processes for data repositories and data sharing. Project SafeEnterprise--which is managed by SafeNet, a global leader in information security--initially focused on solving the military's near-term Net-Centricity requirements for encryption devices that could be easily integrated into a high bandwidth environment. The next challenge was to enable frontline operators to get the information they need for specific tactical operations as well as upload information collected in their operations. Another major concern is authentication, which involves identifying persons who need to be involved in specific strategic communications, determining their security clearance, and devising ways communications can be achieved and protected from those not authorized to receive it. One example of what is being done to achieve these objectives is SafeNet's Hardware Security Module, which provides a secure cryptographic boundary plus type 1 encryption solutions that cover voice, video, and data. The most significant challenge for almost all organizations involved in the network is conducting a risk profile and deciding on a security policy that takes into account how much security they are willing to accept.