Secure and policy-driven computing for fog node applications
Abstract:
In one embodiment, a device in a network gathers characteristics of a container application on the device. The device provides the gathered characteristics of the container application for security assessment. The device receives an indication of the security assessment based on the provided characteristics of the container application. The device controls execution of the container application based on the received indication of the security assessment.
Public/Granted literature
Information query
Patent Agency Ranking
0/0