Rancher Kubernetes Cryptographic Library
FIPS 140-2 Non-Proprietary Security Policyreproduced and distributed in its entirety without modification. Rancher Kubernetes Cryptographic Library FIPS 140-2 Non-Proprietary Security Policy Document Version 1.1 January Policy Rancher Kubernetes Cryptographic Library Page 2 of 16 References Ref Full Specification Name Date [140] FIPS 140-2, Security Requirements for Cryptographic Modules 12/3/2002 [140AA] Derived Test Requirements 1/4/2011 [140IG] Implementation Guidance for FIPS 140-2 and the Cryptographic Module Validation Program 8/28/2020 [SP 800-38A] NIST SP 800-38A, Recommendation for Block0 码力 | 16 页 | 551.69 KB | 1 年前3
Hyperledger Fabric 1.1 Documentationcom/package/windows-build- tools] for more details. Once this is done, you should also install the NPM GRPC module with the following command: npm install --global grpc Your environment should now be ready to go decentralized and collaborative, the information recorded to a blockchain is append-only, using cryptographic techniques that guarantee that once a transaction has been added to the ledger it cannot be modified Bitcoin, ordering happens through a process called mining where competing computers race to solve a cryptographic puzzle which defines the order that all processes subsequently build upon. Hyperledger Fabric0 码力 | 422 页 | 4.84 MB | 1 年前3
Hyperledger Fabric 1.2 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 497 页 | 6.59 MB | 1 年前3
openEuler OS Technical Whitepaper
Innovation Projects
(June, 2023)protocol is a driver module running in the openEuler OS kernel, consisting of the mounting parameter management module at the NFS protocol layer and the multipathing management module at the transport layer deployment and tuning Deployment and tuning documents in scripts Mass dependency installation scripts Module file auto-generation Mass tuning patches One-click performance profiling Cross-platform performance directory structure in the industry to manage massive dependencies and automatically generates module files. • HPCRunner implements one-click compilation and operation, CPU/GPU performance profiling0 码力 | 116 页 | 3.16 MB | 1 年前3
Hyperledger Fabric 1.3 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 528 页 | 6.85 MB | 1 年前3
Hyperledger Fabric 1.2 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of windows-build-tools page for more details. Once this is done, you should also install the NPM GRPC module with the following command: 3.1. Prerequisites 13 hyperledger-fabricdocs Documentation, Release0 码力 | 335 页 | 4.48 MB | 1 年前3
Hyperledger Fabric 1.3 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of decentralized and collaborative, the information recorded to a blockchain is append-only, using cryptographic techniques that guarantee that once a transaction has been added to the ledger it cannot be modified0 码力 | 367 页 | 4.95 MB | 1 年前3
Hyperledger Fabric 1.1 Documentationwindows-build-tools page for more details. Once this is done, you should also install the NPM GRPC module with the following command: 1.1. Prerequisites 5 hyperledger-fabricdocs Documentation, Release decentralized and collaborative, the information recorded to a blockchain is append-only, using cryptographic techniques that guarantee that once a transaction has been added to the ledger it cannot be modified Bitcoin, ordering happens through a process called mining where competing computers race to solve a cryptographic puzzle which defines the order that all processes subsequently build upon. Hyperledger Fabric0 码力 | 277 页 | 3.21 MB | 1 年前3
Hyperledger Fabric 1.4 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 701 页 | 9.02 MB | 1 年前3
Hyperledger Fabric 1.4.8 Documentationexecution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 699 页 | 9.02 MB | 1 年前3
共 1000 条
- 1
- 2
- 3
- 4
- 5
- 6
- 100













