Name of Person responsible for completing IPR Report:
Rodrigo Diaz Rodriguez
Date Completed: 01/07/2010
Project Software
TITLE SECURITY MODULE
DESCRIPTION OF FUNCTIONS
The security module is the responsible of securing all the data flows in the ODYSSEY platform. All messages inside the platform are encrypted, signed and authenticated by means the security services provided by this component. In addition to this, the component also provides authorization and authentication mechanisms to limit and protect the access to the information.
DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED
The background brought by Atos Origin to the Consortium in this context is mainly focused on our expertise and know-how in the usability of security, security standards and secure information management, but also, our knowledge in the design and implementation of large and distributed IT infrastructures.
25%
DETAILS OF THIRD PARTY SOFTWARE INCLUDING CREATOR, TYPE (I.E.OPEN SOURCE), LICENCE TERMS AND CONDITIONS
The alerting component is the Odyssey module devoted to support real-time investigation. To achieve this objective, the module will provide to the Odyssey platform functionalities oriented to support background automatic investigation, where this component will be able to analyze in background all data sources to detect new possible correlations among data.
DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED
The background brought by Atos Origin to the Consortium in this context is mainly focused on our expertise and know-how in the design and implementation of large and distributed IT infrastructures.
25%
DETAILS OF THIRD PARTY SOFTWARE INCLUDING CREATOR, TYPE (I.E.OPEN SOURCE), LICENCE TERMS AND CONDITIONS
0 %
NEW CONTENT
75%
TOTAL
100%
Other IP created
TITLE SECURITY ARCHITECTURE
DESCRIPTION OF FUNCTIONS
The security architecture defined in Odyssey is the result of the design of a layered security architecture which could assist in mapping out all required or successfully implemented security requirements at various levels of information systems. To achieve this architecture, the existing layers of a large distrubted system, such as Odyssey, have been identified and the groundwork for defining security requirements for each layer have been laid, allowing for a mapping of security implications that each layer has on other layers.
DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED
The background brought by Atos Origin to the Consortium in this context is mainly focused on our expertise and know-how in the usability of security, design of secure IT infrastructures, security standards and secure information management, but also, our knowledge in the design and implementation of large and distributed IT infrastructures.
30%
OTHER PARTNERS BACKGROUND USED
%
DETAILS OF OTHER THIRD PARTY IPR INCLUDING CREATOR INCLUDING SOURCE AND STATUS (PUBLIC DOMAIN)