- Atlanta GA, US Rebecca Finnin - Atlanta GA, US Jason Godfrey - Volcano CA, US Craig Harvey - Apex NC, US Daniel Solero - Rockwall TX, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
H04L 29/06
Abstract:
Concepts and technologies are disclosed herein for tag-based security policy creation in a distributed computing environment. A security management module can receive an inventory event that relates to instantiation of a service. The security management module can identify the service that was instantiated and obtain a tag set that relates to the service. The tag set can include security tags that include a string that identifies a communications link associated with the entities included in the service that was instantiated. The security management module can identify policy rules associated with the security tags. The policy rules can define security for the service that was instantiated. The security management module can compute a security policy for the service and can provide the security policy to the computing environment for implementation.
Tag-Based Security Policy Creation In A Distributed Computing Environment
- Atlanta GA, US Rebecca Finnin - Atlanta GA, US Jason Godfrey - Volcano CA, US Craig Harvey - Apex NC, US Daniel Solero - Mooresville IN, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
H04L 29/06
Abstract:
Concepts and technologies are disclosed herein for tag-based security policy creation in a distributed computing environment. A security management module can receive an inventory event that relates to instantiation of a service. The security management module can identify the service that was instantiated and obtain a tag set that relates to the service. The tag set can include security tags that include a string that identifies a communications link associated with the entities included in the service that was instantiated. The security management module can identify policy rules associated with the security tags. The policy rules can define security for the service that was instantiated. The security management module can compute a security policy for the service and can provide the security policy to the computing environment for implementation.
Googleplus
Jason Godfrey
About:
Hello, I am Jason Godfrey and this is my Google+ profile.
Tagline:
Still better than margarine, but not nearly as good as butter.
Bragging Rights:
I couldn't beat the Google+ examples so I won't try.
Jason Godfrey
Lived:
Arlington, VA
Jason Godfrey
Education:
University of South Carolina - MIS
Jason Godfrey
Relationship:
Married
Jason Godfrey
About:
I'm Jason. I'm 18 turning 19 soon. I'm a Trans* man. Pre-everything. I'm enjoying life to my fullest and I make videos because they make me feel better. Rather than keeping everything ...
Bragging Rights:
I have a superman sweater. Be jealous.
Jason Godfrey
Jason Godfrey
Jason Godfrey
Youtube
Are friends more important than lovers? | Men...
In the recent decades, people have broadened their minds to what const...
Duration:
21m 41s
My Time For Urban Escapes - Jason Godfrey
Duration:
2m 1s
Jason Godfrey in America Next Top Model C15 C...
Jason Godfrey in America Next Top Model C15 Commercial.
Duration:
2m 3s
Be Gentlemanly with Jason Godfrey and Tissot
Actor Jason Godfrey links up with Tissot and the Tissot Gentleman Powe...
Duration:
59s
3 Things You Didn't Know about Jason Godfrey
Inquirer Super talks to model-host-actor... Jason Godfrey who hosts "...