skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 220995 Find in a Library
Title: Net-Centricity and Service-Oriented Architectures
Journal: Homeland Defense Journal  Volume:5  Issue:8  Dated:August 2007  Pages:44-46,48
Author(s): Douglas Rhodes
Date Published: August 2007
Page Count: 4
Type: Program/Project Description
Format: Article
Language: English
Country: United States of America
Annotation: This article describes Project SafeEnterprise, whose goal is to provide security for "Net-Centricity" and service-oriented architectures, which are designed to eliminate compartmentalized military and intelligence operations and produce interconnected units that operate cohesively.
Abstract: Project SafeEnterprise is using a combination of available technologies to provide communications anywhere in the world in a secure environment, while maximizing operations under current bandwidth limitations on communications. It supports authentication, authorization, encryption, and access control processes for data repositories and data sharing. Project SafeEnterprise--which is managed by SafeNet, a global leader in information security--initially focused on solving the military's near-term Net-Centricity requirements for encryption devices that could be easily integrated into a high bandwidth environment. The next challenge was to enable frontline operators to get the information they need for specific tactical operations as well as upload information collected in their operations. Another major concern is authentication, which involves identifying persons who need to be involved in specific strategic communications, determining their security clearance, and devising ways communications can be achieved and protected from those not authorized to receive it. One example of what is being done to achieve these objectives is SafeNet's Hardware Security Module, which provides a secure cryptographic boundary plus type 1 encryption solutions that cover voice, video, and data. The most significant challenge for almost all organizations involved in the network is conducting a risk profile and deciding on a security policy that takes into account how much security they are willing to accept.
Main Term(s): Domestic Preparedness
Index Term(s): Communication techniques; Communications; Computer privacy and security; Counter-terrorism intelligence; Intelligence acquisition; Intelligence analysis; Interagency cooperation; Regional information sharing systems; Telecommunications; Visual communications; Voice communications
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.