摘要:
Various aspects of methods, systems, and use cases for trust-based orchestration of an edge node. An edge node may be configured for trust-based orchestration in an edge computing environment, where the edge node includes a transceiver to receive an instruction to perform a workload, the instruction from an edge orchestrator, the edge node being in a group of edge nodes managed with a ledger; and a processor to execute the workload at the edge node to produce a result, wherein the execution of the workload is evaluated by other edge nodes in the group of edge nodes to produce a reputation score of the edge node, where the transceiver is to provide the result to the edge orchestrator.
摘要:
System and techniques for multifactor intelligent agent control are described herein. A workload request may be received from a user device via a network. The workload may be instantiated in an isolated environment on an edge computing platform. Here, the isolated environment may be a container or a virtual machine. The instantiation of the workload may include using a hardware security component (SEC) of the mobile edge computing platform to prevent access to data or code of the workload from other environments hosted by the mobile edge computing platform. The workload may then be executed in the isolated environment and a result of the workload returned to the user device.
摘要:
Methods and apparatus for implemented trusted packet processing for multi-domain separatization and security. Secure enclaves are created in system memory of a compute platform configured to support a virtualized execution environment including a plurality of virtual machines (VMs) or containers, each secure enclave occupying a respective protected portion of the system memory, wherein software code external from a secure enclave cannot access code or data within a secure enclave, and software code in a secure enclave can access code and data both within the secure enclave and external to the secure enclave. Software code for implementing packet processing operations is installed in the secure enclaves. The software in the secure enclaves is then executed to perform the packet processing operations. Various configurations of secure enclaves and software code may be implemented, including configurations supporting service chains both within a VM or contain or across multiple VMs or containers, as well a parallel packet processing operations.
摘要:
Technologies for distributed detection of security anomalies include a computing device to establish a trusted relationship with a security server. The computing device reads one or more packets of at least one of an inter-virtual network function network or an inter-virtual network function component network in response to establishing the trusted relationship and performs a security threat assessment of the one or more packets. The computing device transmits the security threat assessment to the security server.
摘要:
Technologies for geolocation attestation of computing devices in a network path include a verification device to generate a secure trace packet such that the secure trace packet includes a timestamp that corresponds with a departure time of the secure trace packet from the verification device. The computing device transmits the secure trace packet to a computing device in the network path. The network path identifies one or more intermediate devices through which to communicate the secure trace packet from the verification device to a target computing device. The computing device verifies a signature of a cryptographically-signed secure trace packet received by the verification computing device from the computing device and determines whether a sub-path of the network path is authorized based on the cryptographically-signed secure trace packet and reference network path data, which indicates a maximum allowed geographical distance between two computing devices in the network path.
摘要:
Technologies for distributed detection of security anomalies include a computing device to establish a trusted relationship with a security server. The computing device reads one or more packets of at least one of an inter-virtual network function network or an inter-virtual network function component network in response to establishing the trusted relationship and performs a security threat assessment of the one or more packets. The computing device transmits the security threat assessment to the security server.
摘要:
An embodiment of the present invention provides a method, comprising using optimized neighbor graphs for low-power access point assisted fast wireless roaming by a wireless station (STA) operating in a wireless network.
摘要:
Embodiments of apparatuses, articles, methods, and systems for binding various platform identities for a policy negotiation are generally described herein. Other embodiments may be described and claimed.
摘要:
A method and apparatus to enable configuring of a management frame priority and security type. The method and the apparatus may set a priority level and a transmission data rate of a management frame. The apparatus includes a memory including a priority queue for each management frame and a transmitter to transmit said management frame according to the priority queue of said frame.
摘要:
Technologies for reduced power network processing include a main processor, a low-power co-processor, and a network interface controller. The network interface controller receives one or more network packets while the computing device is in a sleep state, filters the one or more network packets to identify network packets to be handled by the low-power co-processor without waking the main processor from the sleep state, and wakes the low-power co-processor, without waking the main processor, to handle at least one network packet of the identified network packets to be handled by the low-power co-processor.