Rancher Kubernetes Cryptographic Library FIPS 140-2 Non-Proprietary Security Policy
reproduced and distributed in its entirety without modification. Rancher Kubernetes Cryptographic Library FIPS 140-2 Non-Proprietary Security Policy Document Version 1.1 January Policy Rancher Kubernetes Cryptographic Library Page 2 of 16 References Ref Full Specification Name Date [140] FIPS 140-2, Security Requirements for Cryptographic Modules 12/3/2002 [140AA] Derived Test Requirements 1/4/2011 [140IG] Implementation Guidance for FIPS 140-2 and the Cryptographic Module Validation Program 8/28/2020 [SP 800-38A] NIST SP 800-38A, Recommendation for Block0 码力 | 16 页 | 551.69 KB | 1 年前3Hyperledger Fabric 1.1 Documentation
decentralized and collaborative, the information recorded to a blockchain is append-only, using cryptographic techniques that guarantee that once a transaction has been added to the ledger it cannot be modified Bitcoin, ordering happens through a process called mining where competing computers race to solve a cryptographic puzzle which defines the order that all processes subsequently build upon. Hyperledger Fabric obfuscate the data, values within chaincode can be encrypted (in part or in total) using common cryptographic algorithms such as AES before sending transactions to the ordering service and appending blocks0 码力 | 422 页 | 4.84 MB | 1 年前3Hyperledger Fabric 1.2 Documentation
execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 497 页 | 6.59 MB | 1 年前3Hyperledger Fabric 1.3 Documentation
execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 528 页 | 6.85 MB | 1 年前3Hyperledger Fabric 1.4.8 Documentation
execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 699 页 | 9.02 MB | 1 年前3Hyperledger Fabric 1.4.9 Documentation
execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 701 页 | 9.02 MB | 1 年前3Hyperledger Fabric 1.4 Documentation
execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 701 页 | 9.02 MB | 1 年前3Hyperledger Fabric 2.2.1 Documentation
execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 848 页 | 11.56 MB | 1 年前3Hyperledger Fabric 2.2.0 Documentation
execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 820 页 | 10.90 MB | 1 年前3Hyperledger Fabric 1.3 Documentation
execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of decentralized and collaborative, the information recorded to a blockchain is append-only, using cryptographic techniques that guarantee that once a transaction has been added to the ledger it cannot be modified0 码力 | 367 页 | 4.95 MB | 1 年前3
共 730 条
- 1
- 2
- 3
- 4
- 5
- 6
- 73