Permalink
Switch branches/tags
Nothing to show
Commits on May 1, 2017
  1. Merge pull request #33 from ABISprotocol/patch-1

    Abstrct committed May 1, 2017
    Update CryptoConsortium Readme Image file link
Commits on Apr 21, 2017
Commits on Mar 6, 2017
  1. Merge pull request #32 from insp3ctre/master

    Abstrct committed Mar 6, 2017
    Spelling fix.
  2. Spelling fix.

    Aaron Hnatiw
    Aaron Hnatiw committed Mar 6, 2017
Commits on Nov 4, 2016
  1. Merge pull request #27 from ABISprotocol/patch-1

    mperklin committed Nov 4, 2016
    Update 104-KeyUsage.yml
  2. Update 104-KeyUsage.yml

    mperklin committed Nov 4, 2016
    Removed unnecessary example
  3. Merge pull request #25 from paveljanik/patch-1

    Abstrct committed Nov 4, 2016
    Fix typo: contirbution -> contribution
Commits on Oct 14, 2016
  1. Update 104-KeyUsage.yml

    ABISprotocol committed Oct 14, 2016
    Enhance with reference to GUID
Commits on Jul 13, 2016
Commits on Jun 18, 2016
  1. Fixed alignment bugs in Matrix and Checklist

    Michael Perklin
    Michael Perklin committed Jun 18, 2016
Commits on Jun 15, 2016
  1. Altered Operator ID check aspect to be required for L1.

    Michael Perklin
    Michael Perklin committed Jun 15, 2016
Commits on Apr 19, 2016
  1. Merge pull request #22 from ethers/patch-1

    Abstrct committed Apr 19, 2016
    typos in README
  2. typos

    ethers committed Apr 19, 2016
Commits on Apr 7, 2016
  1. Updated ChangeLog entry

    Michael Perklin
    Michael Perklin committed Apr 7, 2016
  2. Added new 'Caveat' section that lists items that warrant security con…

    Michael Perklin
    Michael Perklin committed Apr 7, 2016
    …cerns, but cannot be addressed with prescriptive controls across all business systems.
  3. Added definition for Authenticated Communication Channel.

    Michael Perklin
    Michael Perklin committed Apr 7, 2016
    Altered a variety of aspects to require an ACC for communication
  4. Added exception to Key Creation aspect to allow administrator-created…

    Michael Perklin
    Michael Perklin committed Apr 7, 2016
    … key/seeds
    
    to be loaded onto systems that will be used as automated signing agents.
    Clarified that key/seeds must be created on systems with sufficient entropy.
  5. Updated license to 2016

    Michael Perklin
    Michael Perklin committed Apr 7, 2016
  6. Added new changelog entry for 2016Q1 steering committee changes.

    Michael Perklin
    Michael Perklin committed Apr 7, 2016
    Merged EMP aspect into environment aspect
Commits on Nov 3, 2015
  1. Merge pull request #17 from mperklin/master

    mperklin committed Nov 3, 2015
    Merge changes received from Deloitte
Commits on Sep 2, 2015
  1. Merge pull request #20 from esneider/patch-1

    mperklin committed Sep 2, 2015
    Fix typo
Commits on Aug 28, 2015
  1. Fix typo

    esneider committed Aug 28, 2015
Commits on Jun 26, 2015
  1. Updated changelog entry

    Michael Perklin
    Michael Perklin committed Jun 26, 2015
Commits on Jun 11, 2015
  1. Added changelog markdown document

    Michael Perklin
    Michael Perklin committed Jun 11, 2015
  2. Fixed unchanged references to old KCP to reference the new Key Compro…

    Michael Perklin
    Michael Perklin committed Jun 11, 2015
    …mise Protocol name
Commits on Jun 7, 2015
  1. Committed changes suggested via Project Delphi. Renamed KCP to Key Co…

    Michael Perklin
    Michael Perklin committed Jun 7, 2015
    …mpromise *Protocol
Commits on Apr 22, 2015
  1. Merge pull request #13 from GemHQ/gh-pages

    Abstrct committed Apr 22, 2015
    Definitions section – Clarifications – some structural changes
Commits on Apr 14, 2015
  1. formatting

    thedoctor committed Apr 14, 2015
  2. def-linked 2.02

    thedoctor committed Apr 14, 2015
  3. def-linked 1.06

    thedoctor committed Apr 14, 2015
Commits on Apr 13, 2015
  1. Added definition tags and clarified that only organizational key hol…

    thedoctor committed Apr 13, 2015
    …ders must meet identity verification/background check requirements -- also clarified that a password is optional so long as the number of authentication factors is sufficiently high -- I recommend we examine the background check requirement as it's still very vague, but I'm not sure how to best address that.