Hyperledger Fabric 1.2 Documentationdelivering on enterprise use case require- ments, blockchain platforms have adopted a variety of approaches. All have their trade-offs. Encrypting data is one approach to providing confidentiality; however confidentiality. In a permissioned context that can leverage alternate forms of consensus, one might explore approaches that restrict the distribution of confidential information exclusively to authorized nodes. Hyperledger validated against the instantiation policy of the chaincode. Creating the package There are two approaches to packaging chaincode. One for when you want to have multiple owners of a chaincode, and hence0 码力 | 335 页 | 4.48 MB | 1 年前3
Hyperledger Fabric 1.2 Documentationdelivering on enterprise use case requirements, blockchain platforms have adopted a variety of approaches. All have their trade-offs. Encrypting data is one approach to providing confidentiality; however confidentiality. In a permissioned context that can leverage alternate forms of consensus, one might explore approaches that restrict the distribution of confidential information exclusively to authorized nodes. Hyperledger validated against the instantiation policy of the chaincode. Creating the package There are two approaches to packaging chaincode. One for when you want to have multiple owners of a chaincode, and hence0 码力 | 497 页 | 6.59 MB | 1 年前3
Hyperledger Fabric 1.3 Documentationdelivering on enterprise use case requirements, blockchain platforms have adopted a variety of approaches. All have their trade-offs. Encrypting data is one approach to providing confidentiality; however confidentiality. In a permissioned context that can leverage alternate forms of consensus, one might explore approaches that restrict the distribution of confidential information exclusively to authorized nodes. Hyperledger validated against the instantiation policy of the chaincode. Creating the package There are two approaches to packaging chaincode. One for when you want to have multiple owners of a chaincode, and hence0 码力 | 528 页 | 6.85 MB | 1 年前3
Hyperledger Fabric 1.3 Documentationdelivering on enterprise use case require- ments, blockchain platforms have adopted a variety of approaches. All have their trade-offs. Encrypting data is one approach to providing confidentiality; however confidentiality. In a permissioned context that can leverage alternate forms of consensus, one might explore approaches that restrict the distribution of confidential information exclusively to authorized nodes. Hyperledger validated against the instantiation policy of the chaincode. Creating the package There are two approaches to packaging chaincode. One for when you want to have multiple owners of a chaincode, and hence0 码力 | 367 页 | 4.95 MB | 1 年前3
Hyperledger Fabric 1.1 Documentationvalidated against the instantiation policy of the chaincode. Creating the package There are two approaches to packaging chaincode. One for when you want to have multiple owners of a chaincode, and hence “sufficiently many”?. This is defined by a checkpoint validity policy, with (at least) two possible approaches, which may also be combined: Local (peer-specific) checkpoint validity policy (LCVP). A local digital tokens) to design assets, as well as the logic that manages them. There are two popular approaches to defining assets in most blockchain solutions: the stateless UTXO model, where account balances0 码力 | 422 页 | 4.84 MB | 1 年前3
Hyperledger Fabric 1.1 Documentationvalidated against the instantiation policy of the chaincode. Creating the package There are two approaches to packaging chaincode. One for when you want to have multiple owners of a chaincode, and hence “sufficiently many”?. This is defined by a checkpoint validity policy, with (at least) two possible approaches, which may also be combined: • Local (peer-specific) checkpoint validity policy (LCVP). A local digital tokens) to design assets, as well as the logic that manages them. There are two popular approaches to defining assets in most blockchain solutions: the stateless UTXO model, where account balances0 码力 | 277 页 | 3.21 MB | 1 年前3
Hyperledger Fabric 1.4.8 Documentationdelivering on enterprise use case requirements, blockchain platforms have adopted a variety of approaches. All have their trade-offs. Encrypting data is one approach to providing confidentiality; however confidentiality. In a permissioned context that can leverage alternate forms of consensus, one might explore approaches that restrict the distribution of confidential information exclusively to authorized nodes. Hyperledger validated against the instantiation policy of the chaincode. Creating the package There are two approaches to packaging chaincode. One for when you want to have multiple owners of a chaincode, and hence0 码力 | 699 页 | 9.02 MB | 1 年前3
Hyperledger Fabric 1.4.9 Documentationdelivering on enterprise use case require- ments, blockchain platforms have adopted a variety of approaches. All have their trade-offs. Encrypting data is one approach to providing confidentiality; however confidentiality. In a permissioned context that can leverage alternate forms of consensus, one might explore approaches that restrict the distribution of confidential information exclusively to authorized nodes. Hyperledger validated against the instantiation policy of the chaincode. Creating the package There are two approaches to packaging chaincode. One for when you want to have multiple owners of a chaincode, and hence0 码力 | 483 页 | 7.48 MB | 1 年前3
Hyperledger Fabric 1.4.9 Documentationdelivering on enterprise use case requirements, blockchain platforms have adopted a variety of approaches. All have their trade-offs. Encrypting data is one approach to providing confidentiality; however confidentiality. In a permissioned context that can leverage alternate forms of consensus, one might explore approaches that restrict the distribution of confidential information exclusively to authorized nodes. Hyperledger validated against the instantiation policy of the chaincode. Creating the package There are two approaches to packaging chaincode. One for when you want to have multiple owners of a chaincode, and hence0 码力 | 701 页 | 9.02 MB | 1 年前3
Hyperledger Fabric 1.4 Documentationdelivering on enterprise use case require- ments, blockchain platforms have adopted a variety of approaches. All have their trade-offs. Encrypting data is one approach to providing confidentiality; however confidentiality. In a permissioned context that can leverage alternate forms of consensus, one might explore approaches that restrict the distribution of confidential information exclusively to authorized nodes. Hyperledger validated against the instantiation policy of the chaincode. Creating the package There are two approaches to packaging chaincode. One for when you want to have multiple owners of a chaincode, and hence0 码力 | 483 页 | 7.48 MB | 1 年前3
共 42 条
- 1
- 2
- 3
- 4
- 5













