Hyperledger Fabric 2.2.1 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 848 页 | 11.56 MB | 1 年前3
Hyperledger Fabric 2.0.1 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 760 页 | 10.21 MB | 1 年前3
Hyperledger Fabric 2.2.0 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 820 页 | 10.90 MB | 1 年前3
Hyperledger Fabric 2.1.1 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 816 页 | 10.25 MB | 1 年前3
Hyperledger Fabric 2.0 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 821 页 | 10.22 MB | 1 年前3
Hyperledger Fabric 2.1 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 904 页 | 10.95 MB | 1 年前3
Hyperledger Fabric 2.0.1 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of model allows for a chaincode to be upgraded only after a sufficient number of organizations have approved the upgrade. • Simpler endorsement policy and private data collection updates Fabric lifecycle0 码力 | 533 页 | 8.37 MB | 1 年前3
Hyperledger Fabric 2.2.0 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of model allows for a chaincode to be upgraded only after a sufficient number of organizations have approved the upgrade. • Simpler endorsement policy and private data collection updates Fabric lifecycle0 码力 | 577 页 | 9.03 MB | 1 年前3
Hyperledger Fabric 2.2.1 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of model allows for a chaincode to be upgraded only after a sufficient number of organizations have approved the upgrade. • Simpler endorsement policy and private data collection updates Fabric lifecycle0 码力 | 575 页 | 8.55 MB | 1 年前3
Hyperledger Fabric 2.0 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of model allows for a chaincode to be upgraded only after a sufficient number of organizations have approved the upgrade. • Simpler endorsement policy and private data collection updates Fabric lifecycle0 码力 | 573 页 | 8.52 MB | 1 年前3
共 57 条
- 1
- 2
- 3
- 4
- 5
- 6













