Administration

ACDC Sessions

  • Proposed sessions
    • GLEIF vLEI  Business T S1
    • GLEIF vLEI: Demo   T S2 Distributed Multi-Sig Chained Credentials using KERI and ACDC — Phil Feairheller and Kevin Griffin
    • MicroLedger Four Provenance Logs Authentic Data EcoSystem  T S3 Robert Mitwicki
    • What is ACDC? T S4— Samuel Smith
      • KERI and ACDC Technical Session
      • Covers all the contributing specsSamuel Smith
  • Related Sessions
    • Introduction to KERI W Drummond Reed 
    • Practical Introduction to KERI: How Can I Actually Use it Today?W Phil FeairhellerKevin Griffin (Command Line Tools with KeriPy)
    • Systems Design PAC Theorem Privacy Authenticity Confidentiality  Tradespace W Th  Samuel Smith
    • Secure Attribution with KERI: How it Fixes the Broken Internet W Th — Samuel Smith
    • Zero Trust Data Management  BADA RUN vs CRUD: discovery and authorization mechanisms W or ThSamuel Smith
  • No labels