Administration
- We discussed filling in the rest of the Deliverables table on the ACDC home page.
ACDC Sessions
- Proposed sessions
- GLEIF vLEI Business T S1
- GLEIF vLEI: Demo T S2 Distributed Multi-Sig Chained Credentials using KERI and ACDC — Phil Feairheller and Kevin Griffin
- MicroLedger Four Provenance Logs Authentic Data EcoSystem T S3 Robert Mitwicki
- What is ACDC? T S4— Samuel Smith
- KERI and ACDC Technical Session
- Covers all the contributing specsSamuel Smith
- Related Sessions
- Introduction to KERI W Drummond Reed
- Practical Introduction to KERI: How Can I Actually Use it Today?W Phil FeairhellerKevin Griffin (Command Line Tools with KeriPy)
- Systems Design PAC Theorem Privacy Authenticity Confidentiality Tradespace W Th Samuel Smith
- Secure Attribution with KERI: How it Fixes the Broken Internet W Th — Samuel Smith
- Zero Trust Data Management BADA RUN vs CRUD: discovery and authorization mechanisms W or ThSamuel Smith