Главная
Study mode:
on
1
Intro
2
How do they work
3
What does it mean
4
Things to think about
5
Why use signatures
6
Compromise resilience
7
Verification
8
Storage
9
Establishing Trust
10
Trust Limitations
11
Delegations
12
Multisignatures
13
Signature Projects
14
Notation
15
Cosine
16
Update Framework
17
Entoto
18
Thresholds
19
Contact Info
20
Template
Description:
Explore the role of cryptographic signatures in securing the software supply chain through this informative conference talk. Delve into the capabilities and limitations of cryptographic signatures, understanding their function as a crucial building block rather than a complete solution. Learn about effective implementation strategies, common pitfalls to avoid, and real-world applications in cloud native supply chain security. Examine topics such as compromise resilience, verification processes, trust establishment, and delegation mechanisms. Gain insights into signature projects like Notation, Cosine, and Update Framework. Discover how multisignatures and thresholds enhance security measures. Equip yourself with essential knowledge to leverage cryptographic signatures effectively in your software development and security practices.

Cryptographic Signatures - A Building Block Not A Panacea

CNCF [Cloud Native Computing Foundation]
Add to list