Proprietary rights statement


Odyssey Consortium Member Declared IPR Template



Download 1.51 Mb.
Page29/31
Date05.01.2017
Size1.51 Mb.
#7149
1   ...   23   24   25   26   27   28   29   30   31

26. Odyssey Consortium Member Declared IPR Template




Organisation Information


Name of Organisation:


Name of Person responsible for completing IPR Report:


Date Completed:


Project Software - Software elements created in the ODYSSEY project including components thereof.

TITLE


DESCRIPTION OF FUNCTIONS


DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED

%



DETAILS OF THIRD PARTY SOFTWARE INCLUDING CREATOR, TYPE (I.E.OPEN SOURCE), LICENCE TERMS AND CONDITIONS

%



NEW CONTENT



%

TOTAL

100%

Other IP created - Non-software elements such as protocols or information relating to standards, methods etc.

TITLE


DESCRIPTION OF FUNCTIONS


DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED

%



OTHER PARTNERS BACKGROUND USED

%



DETAILS OF OTHER THIRD PARTY IPR INCLUDING CREATOR INCLUDING SOURCE AND STATUS (PUBLIC DOMAIN)

%



NEW CONTENT



%

TOTAL

100%


27 Odyssey Consortium Members Declared IPR

27.1 Atos Origin


Organisation Information

Name of Organisation: ATOS ORIGIN SAE

Name of Person responsible for completing IPR Report:

Rodrigo Diaz Rodriguez



Date Completed: 01/07/2010


Project Software


TITLE SECURITY MODULE

DESCRIPTION OF FUNCTIONS

The security module is the responsible of securing all the data flows in the ODYSSEY platform. All messages inside the platform are encrypted, signed and authenticated by means the security services provided by this component. In addition to this, the component also provides authorization and authentication mechanisms to limit and protect the access to the information.



DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED

The background brought by Atos Origin to the Consortium in this context is mainly focused on our expertise and know-how in the usability of security, security standards and secure information management, but also, our knowledge in the design and implementation of large and distributed IT infrastructures.



25%



DETAILS OF THIRD PARTY SOFTWARE INCLUDING CREATOR, TYPE (I.E.OPEN SOURCE), LICENCE TERMS AND CONDITIONS

0 %



NEW CONTENT

75%

TOTAL

100%



TITLE ALERTING COMPONENT

DESCRIPTION OF FUNCTIONS

The alerting component is the Odyssey module devoted to support real-time investigation. To achieve this objective, the module will provide to the Odyssey platform functionalities oriented to support background automatic investigation, where this component will be able to analyze in background all data sources to detect new possible correlations among data.



DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED

The background brought by Atos Origin to the Consortium in this context is mainly focused on our expertise and know-how in the design and implementation of large and distributed IT infrastructures.



25%



DETAILS OF THIRD PARTY SOFTWARE INCLUDING CREATOR, TYPE (I.E.OPEN SOURCE), LICENCE TERMS AND CONDITIONS

0 %



NEW CONTENT

75%

TOTAL

100%


Other IP created


TITLE SECURITY ARCHITECTURE

DESCRIPTION OF FUNCTIONS

The security architecture defined in Odyssey is the result of the design of a layered security architecture which could assist in mapping out all required or successfully implemented security requirements at various levels of information systems. To achieve this architecture, the existing layers of a large distrubted system, such as Odyssey, have been identified and the groundwork for defining security requirements for each layer have been laid, allowing for a mapping of security implications that each layer has on other layers.




DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED

The background brought by Atos Origin to the Consortium in this context is mainly focused on our expertise and know-how in the usability of security, design of secure IT infrastructures, security standards and secure information management, but also, our knowledge in the design and implementation of large and distributed IT infrastructures.



30%



OTHER PARTNERS BACKGROUND USED

%



DETAILS OF OTHER THIRD PARTY IPR INCLUDING CREATOR INCLUDING SOURCE AND STATUS (PUBLIC DOMAIN)

%



NEW CONTENT



70%

TOTAL

100%


Download 1.51 Mb.

Share with your friends:
1   ...   23   24   25   26   27   28   29   30   31




The database is protected by copyright ©ininet.org 2024
send message

    Main page