Hyperledger Composer is a set of development tools for building blockchain applications and business networks on Hyperledger Fabric. It includes a modeling language (CTO) to define assets, participants, transactions and events. It also includes a web-based Playground interface to quickly define, deploy and test business networks without installing dependencies. Composer provides a command line interface to integrate modeled business networks with Hyperledger Fabric. A business network definition includes model files, transaction processor functions, and access control rules. It can be deployed and tested on Playground or integrated with Hyperledger Fabric.
This slide is a entry level introduction to blockchain security, it illustrates the current status of the issue, summarises attack methodology, and reviewed a few past hack cases.
The fundamental security properties of blockchain originate from both bitcoin architecture and cryptography advances. the proficiency of the cryptographic chain of blocks was advanced giving birth to various inborn security qualities.
Hackbama Presentation
Presenter: Jason Cuneo
Abstract: The revolution of blockchain centered technologies provides security practitioners with a unique opportunity to participate in shaping the future of secure networking and has the potential to redefine how organizations and society transact and determine value. The objective of this discussion is to introduce how blockchains are disrupting the status quo and how they can be used to improve the Cybersecurity landscape.
How to Create Blockchain Products by Slice.Market CTOProduct School
Main takeaways:
-Intro to blockchain concepts, public/private keys, signing transactions, wallets,
-Product challenges unique to blockchain
-Metamask and other tools that people currently use to interact with the Ethereum blockchain
-Common design and product considerations when making a blockchain product
Blockchain technology is being touted as the Next Big Thing, seemingly capable of great feats of strength and perhaps even curing the common cold. But what exactly is it and how could it contribute to a security program? This session will describe how blockchain works, define its value proposition, and identify specific use cases where blockchain makes sense and some where it doesn't. Along the way, we will discuss similar capabilities and technologies that accomplish the objectives.
This slide is a entry level introduction to blockchain security, it illustrates the current status of the issue, summarises attack methodology, and reviewed a few past hack cases.
The fundamental security properties of blockchain originate from both bitcoin architecture and cryptography advances. the proficiency of the cryptographic chain of blocks was advanced giving birth to various inborn security qualities.
Hackbama Presentation
Presenter: Jason Cuneo
Abstract: The revolution of blockchain centered technologies provides security practitioners with a unique opportunity to participate in shaping the future of secure networking and has the potential to redefine how organizations and society transact and determine value. The objective of this discussion is to introduce how blockchains are disrupting the status quo and how they can be used to improve the Cybersecurity landscape.
How to Create Blockchain Products by Slice.Market CTOProduct School
Main takeaways:
-Intro to blockchain concepts, public/private keys, signing transactions, wallets,
-Product challenges unique to blockchain
-Metamask and other tools that people currently use to interact with the Ethereum blockchain
-Common design and product considerations when making a blockchain product
Blockchain technology is being touted as the Next Big Thing, seemingly capable of great feats of strength and perhaps even curing the common cold. But what exactly is it and how could it contribute to a security program? This session will describe how blockchain works, define its value proposition, and identify specific use cases where blockchain makes sense and some where it doesn't. Along the way, we will discuss similar capabilities and technologies that accomplish the objectives.
Tokenization on Blockchain is a steady trend of 2018. It seems that everything is being tokenized on Blockchain from paintings, diamonds and company stocks to real estate. Thus, we took an asset, tokenized it and created its digital representation that lives on Blockchain. Blockchain guarantees that the ownership information is immutable.
Unfortunately, some problems need to be solved before we can successfully tokenize real-world assets on Blockchain. Main problem stems from the fact that so far, no country has a solid regulation for cryptocurrency. For example, what happens if a company that handles tokenization sells the property? They have no legal rights on the property and thus are not protected by the law. Another problem is that this system brings us back some sort of centralization. The whole idea of Blockchain and especially smart contracts is to create a trustless environment.
Tokenization on Blockchain is a steady trend of 2018. Blockchain guarantees that the ownership information is immutable. Unfortunately, some problems need to be solved before we can successfully tokenize real-world assets on Blockchain. Main problem stems from the fact that so far, no country has a solid regulation for cryptocurrency.
Tokenization is a method that converts a digital value into a digital token. Tokenization can be used as a method that converts rights to an asset into a digital token. The tokenization system can be implemented local to the data that is tokenized or offloaded to cloud. Tokenization in cloud can provide a lower total cost of ownership by sharing resources implementation and administration. A high level of security can be achieved by separating the tokenization system into a container that can be run on-prem (for larger banks) or isolated in a remote private cloud.
Please join my session that will discuss tokenization, blockchain and tokenization in blockchain.
Blockchain based Security Architectures - A ReviewGokul Alex
From my session on #Blockchain based #Cybersecurity Architectures presented in the Malabar Cybersecurity Summit organised by RedTeam Hacker Academy in Calicut. This presentation navigates through the fundamental concepts of Blockchain, Tamper Evidence properties of Blockchain Data Structure, Blockchain Architectures, Possibilities of Immutable Ledger, Importance of Blockchain for Digital Identities, IoT Security etc.
Introduction to Blockchain Governance ModelsGokul Alex
The presentation on the history and emergence of distributed consensus and the contemporary aspects of Blockchain Governance presented for the Global FinTech and Blockchain Forum organised by Pyramid Learning Platforms.
Presentation by DHS S&T at the NY Blockchain 360 Conference regarding Blockchain's relevance to the Homeland Security Enterprise. Results of security and privacy research and development over the last 2+ years and next steps.
Project Bletchley is a vision for Microsoft to deliver Blockchain as a Service (BaaS) that is open and flexible for all platforms, partners and customers. In this session, we will start by giving you an intro into Blockchain technology, what it is, how and where it can be used and talk about various examples and real world scenarios that can be built with it.
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...eraser Juan José Calderón
Blockchain for AI: Review and Open. Research Challenges
K. SALAH, M. H. REHMAN, N. NIZAMUDDIN and A. Al-Fuqaha
ABSTRACT
Recently, Artificial Intelligence (AI) and blockchain have become two of the most trending and disruptive technologies. Blockchain technology has the ability to automate payment in cryptocurrency and to provide access to a shared ledger of data, transactions, and logs in a decentralized, secure, and trusted manner. Also with smart contracts, blockchain has the ability to govern interactions among participants with no intermediary or a trusted third party. AI, on the other hand, offers intelligence and decision- making capabilities for machines similar to humans. In this paper, we present a detailed survey on blockchain applications for AI. We review the literature, tabulate, and summarize the emerging blockchain applications, platforms, and protocols specifically targeting AI area. We also identify and discuss open research challenges of utilizing blockchain technologies for AI.
Building Blockchain Projects on Enterprise Ethereum [Webinar] Kaleido
Enterprise blockchain has accelerated over the past year, with many projects launching into production. Backed by the largest ecosystem of blockchain developers and experts, leading global organizations are adopting Enterprise Ethereum to build, test and deploy decentralized applications to increase trust and transparency while unlocking new opportunities to create value across modern business networks. Learn how Enterprise Ethereum is well-suited for enterprise blockchain projects, and how Kaleido’s full-stack platform, PegaSys' production-grade Ethereum protocol and Microsoft’s tools and expertise help to unlock the full potential of Enterprise Ethereum based projects. Together, we’ll discuss how to enable rapid, easy and affordable deployment of enterprise blockchain solutions.
LEARNING OBJECTIVES AND TAKEAWAYS:
- How Ethereum supports enterprise blockchain projects.
- Convergence of Private and Public Blockchain
- Digital Transformation and Asset Tokenization for Enterprise
- Full-stack enterprise blockchain solutions
- Microsoft PoV on Enterprise Ethereum
- Protocols designed for enterprise.
- Customer adoption: Enterprise Ethereum in Production Networks
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Floyd DCosta
Blockchain Defined Perimeter (BDP) is an enhanced Software-Defined Perimeter - that renders critical systems / cloud servers invisible; thereby making it near impossible for hackers to discover and attack, while providing a secure communication channel for legitimate users.
These slides were presented at Darefest 2016 in Antwerp. The presentation explains the evolution of cryptocurrency and the next steps towards full decentralisation.
For more info or to book your own session, visit www.bite.be
BlockChains are a logical next step beyond centralised and distributed (networked) ledgers used to record all forms of transaction, files and documentation for legal, medical, industrial, government and defence entities. The biggest change is the lack of any middle man and/or institutions. With open and available to anyone, individuals and groups as well as companies can build open, closed, public or private BlockChains.
The technology constitutes a step function in security, privacy, reliability and utility. Although it is the basis of BitCoin and other currencies, it is not limited to financial transactions and can be applied to all forms of asset movement, agreements, documents, files, voting and more across all sectors.
The base concepts are founded on networking and distributed adjudication processes that generally embrace Digital Signatures, Public and Private Key, Encryption, and Hash Checks.
This introductory session for the security model of blockchain will cover the 101 of blockchain technology, how transactions work and the use of cryptography for securing the distributed ledger, private and public keys, multisignature and review one of the hacks Ethereum has been exposed to, the parity wallet hack.
Tokenization on Blockchain is a steady trend of 2018. It seems that everything is being tokenized on Blockchain from paintings, diamonds and company stocks to real estate. Thus, we took an asset, tokenized it and created its digital representation that lives on Blockchain. Blockchain guarantees that the ownership information is immutable.
Unfortunately, some problems need to be solved before we can successfully tokenize real-world assets on Blockchain. Main problem stems from the fact that so far, no country has a solid regulation for cryptocurrency. For example, what happens if a company that handles tokenization sells the property? They have no legal rights on the property and thus are not protected by the law. Another problem is that this system brings us back some sort of centralization. The whole idea of Blockchain and especially smart contracts is to create a trustless environment.
Tokenization on Blockchain is a steady trend of 2018. Blockchain guarantees that the ownership information is immutable. Unfortunately, some problems need to be solved before we can successfully tokenize real-world assets on Blockchain. Main problem stems from the fact that so far, no country has a solid regulation for cryptocurrency.
Tokenization is a method that converts a digital value into a digital token. Tokenization can be used as a method that converts rights to an asset into a digital token. The tokenization system can be implemented local to the data that is tokenized or offloaded to cloud. Tokenization in cloud can provide a lower total cost of ownership by sharing resources implementation and administration. A high level of security can be achieved by separating the tokenization system into a container that can be run on-prem (for larger banks) or isolated in a remote private cloud.
Please join my session that will discuss tokenization, blockchain and tokenization in blockchain.
Blockchain based Security Architectures - A ReviewGokul Alex
From my session on #Blockchain based #Cybersecurity Architectures presented in the Malabar Cybersecurity Summit organised by RedTeam Hacker Academy in Calicut. This presentation navigates through the fundamental concepts of Blockchain, Tamper Evidence properties of Blockchain Data Structure, Blockchain Architectures, Possibilities of Immutable Ledger, Importance of Blockchain for Digital Identities, IoT Security etc.
Introduction to Blockchain Governance ModelsGokul Alex
The presentation on the history and emergence of distributed consensus and the contemporary aspects of Blockchain Governance presented for the Global FinTech and Blockchain Forum organised by Pyramid Learning Platforms.
Presentation by DHS S&T at the NY Blockchain 360 Conference regarding Blockchain's relevance to the Homeland Security Enterprise. Results of security and privacy research and development over the last 2+ years and next steps.
Project Bletchley is a vision for Microsoft to deliver Blockchain as a Service (BaaS) that is open and flexible for all platforms, partners and customers. In this session, we will start by giving you an intro into Blockchain technology, what it is, how and where it can be used and talk about various examples and real world scenarios that can be built with it.
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...eraser Juan José Calderón
Blockchain for AI: Review and Open. Research Challenges
K. SALAH, M. H. REHMAN, N. NIZAMUDDIN and A. Al-Fuqaha
ABSTRACT
Recently, Artificial Intelligence (AI) and blockchain have become two of the most trending and disruptive technologies. Blockchain technology has the ability to automate payment in cryptocurrency and to provide access to a shared ledger of data, transactions, and logs in a decentralized, secure, and trusted manner. Also with smart contracts, blockchain has the ability to govern interactions among participants with no intermediary or a trusted third party. AI, on the other hand, offers intelligence and decision- making capabilities for machines similar to humans. In this paper, we present a detailed survey on blockchain applications for AI. We review the literature, tabulate, and summarize the emerging blockchain applications, platforms, and protocols specifically targeting AI area. We also identify and discuss open research challenges of utilizing blockchain technologies for AI.
Building Blockchain Projects on Enterprise Ethereum [Webinar] Kaleido
Enterprise blockchain has accelerated over the past year, with many projects launching into production. Backed by the largest ecosystem of blockchain developers and experts, leading global organizations are adopting Enterprise Ethereum to build, test and deploy decentralized applications to increase trust and transparency while unlocking new opportunities to create value across modern business networks. Learn how Enterprise Ethereum is well-suited for enterprise blockchain projects, and how Kaleido’s full-stack platform, PegaSys' production-grade Ethereum protocol and Microsoft’s tools and expertise help to unlock the full potential of Enterprise Ethereum based projects. Together, we’ll discuss how to enable rapid, easy and affordable deployment of enterprise blockchain solutions.
LEARNING OBJECTIVES AND TAKEAWAYS:
- How Ethereum supports enterprise blockchain projects.
- Convergence of Private and Public Blockchain
- Digital Transformation and Asset Tokenization for Enterprise
- Full-stack enterprise blockchain solutions
- Microsoft PoV on Enterprise Ethereum
- Protocols designed for enterprise.
- Customer adoption: Enterprise Ethereum in Production Networks
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Floyd DCosta
Blockchain Defined Perimeter (BDP) is an enhanced Software-Defined Perimeter - that renders critical systems / cloud servers invisible; thereby making it near impossible for hackers to discover and attack, while providing a secure communication channel for legitimate users.
These slides were presented at Darefest 2016 in Antwerp. The presentation explains the evolution of cryptocurrency and the next steps towards full decentralisation.
For more info or to book your own session, visit www.bite.be
BlockChains are a logical next step beyond centralised and distributed (networked) ledgers used to record all forms of transaction, files and documentation for legal, medical, industrial, government and defence entities. The biggest change is the lack of any middle man and/or institutions. With open and available to anyone, individuals and groups as well as companies can build open, closed, public or private BlockChains.
The technology constitutes a step function in security, privacy, reliability and utility. Although it is the basis of BitCoin and other currencies, it is not limited to financial transactions and can be applied to all forms of asset movement, agreements, documents, files, voting and more across all sectors.
The base concepts are founded on networking and distributed adjudication processes that generally embrace Digital Signatures, Public and Private Key, Encryption, and Hash Checks.
This introductory session for the security model of blockchain will cover the 101 of blockchain technology, how transactions work and the use of cryptography for securing the distributed ledger, private and public keys, multisignature and review one of the hacks Ethereum has been exposed to, the parity wallet hack.
The blockchain is an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions but virtually everything of value.
for more inforamation please visit our youtube channel
https://www.youtube.com/edit?o=U&video_id=EvICyArbFSs
www.rihusoft.com
This tutorial will walk you through building a Hyperledger Composer blockchain solution from scratch. In the space of a few hours you will be able to go from an idea for a disruptive blockchain innovation, to executing transactions against a real Hyperledger Fabric blockchain network and generating/running a sample Angular 2 application that interacts with a blockchain network.
This tutorial gives an overview of the techniques and resources available to apply to your own use case.
Note: This tutorial was written against the latest Hyperledger Composer build on Ubuntu Linux running with Hyperledger Fabric v1.0 where referenced below and also tested for a Mac environment.
Gluecon 2016 Keynote: Deploying and Managing Blockchain ApplicationsDuncan Johnston-Watt
Blockchain technology has exploded on the business scene in the last few months notably with the establishment of the Hyperledger Project hosted by the Linux Foundation. We look at the background to this project; some of the challenges to its mainstream adoption; then wrap up with a demo deploying and managing a Hyperledger Fabric cluster using Apache Brooklyn.
Blockchain technology has leapt to prominence in the past year, notably with the establishment of the open source Hyperledger Project hosted by the Linux Foundation. This talk examines Blockchain's impact on financial services and asset management. Using Cloudsoft Application Management Platform (AMP), we show how we can rapidly deploy and manage a Hyperledger Fabric running on a Bluemix Private Cloud across San Jose, London, and Singapore, creating a geographically distributed Blockchain network. Finally we drill down on the Apache Brooklyn blueprint that models this fabric and makes it possible.
https://cloudsoft.io/gethlf/
IBM InterConnect 2017 | Session 2444A
As enterprises across verticals explore the
opportunities for innovation and process
optimization using blockchain technologies, they
are looking for in technical aspects of deploying
and integrating blockchain technology, with their
existing IT systems.
Based on operating models and blockchain
platforms, there are variations in deployment and
operations aspects, along with factors like
integration & information security. This document
provides approach and factors to consider during
selection and implementation of blockchain
technologies
https://www.lntinfotech.com/Canada/
Similar to 03 - An introduction to hyperledger composer (20)
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
1. Intelligent Blockchain Engineering Lab
Department of Computer Science Engineering
Korea University
November 2019
MPYANA MWAMBA MERLEC
AN INTRODUCTION TO
4. Business Network Concepts
4
It provides connectivity
Connects customers, suppliers, banks and partners
Across geographically and regulatory boundaries
Wealth is generated by the flow of goods
& services across the business network
Markets are the key to this process:
Public (food market, car auction, appliances, etc.)
Private (supply chain, financing, bonds)
Business Network is a group of entities who work together to accomplish certain goals
6. Business Network Concepts
6
Ledger – the system of record for a business
Used to record transactions (asset transfer between participants)
Business might have multiple ledgers for multiple business networks where
they are involved.
Participants – members of a business network
Customer, Supplier, Government, Regulator
Usually resides in an organization
Has specific identities and roles
Transaction – an asset transfer
e.g. Merlec gives a Car to Daegeon Lee
Transactions are used to interact with assets
Contract – document containing conditions for a
transaction to occur
If Daegeon Lee pays Merlec money, then car passes from Merlec to
Daegeon Lee
A contract for shipment of 100 pieces of smartphones for X price
based on conditions {X, Y, Z}
7. Business Network – Car Auction Market
7
A Business network describes any group of organizations or individuals that connect with a desire to transfer or share assets.
DMV – Department of Motor Vehicles
8. Actors in a Fabric Business Network
Infrastructure
8
Hyperledger Fabric permissioned blockchain
network is a technical infrastructure that
provides ledger service to app. consumer
and administrators.
15. 15
An extensive, open development toolset and framework for blockchain applications
developing, and consists of :
A modeling language called CTO (an homage to the original project name, Concerto)
A user interface called Hyperledger Composer Playground
For quick and easy definition, configuration, deployment, and testing of business networks
Command-Line Interface (CLI) tools for integrating modeled business networks
using Hyperledger Composer with a running instance of the Hyperledger Fabric blockchain network
18. Elements of Hyperledger Composer
18
Blockchain State Storage
All transactions submitted through a business network are stored on the blockchain ledger
The current state of assets and participants are stored in the blockchain state database
The ledger and the state database are distributed across a set of peers
The blockchain ensures that updates to the ledger and state DB are consistent across all peers using a consensus algorithm
Connection Profile
It is a JSON document that is part of a business network card.
Hyperledger Composer uses Connection Profiles to define the system to connect to.
Business Network Card
It is a combination of an identity, a connection profile, and metadata.
the metadata optionally containing the name of the business network to connect to.
22. Business Network Definition (BND)
22
Hyperledger composer has its own modeling
language used to model the business network
BND is a key concept of Hyperledger Composer
programming model. They are represented by :
BusinessNetworkDefinition class:
defined in composer-common module
exported by both composer-admin and composer-client.
Business Network Definitions are composed of :
a set of model files (.cto)
a set of JavaScript files (.js)
an Access Control file (.acl)
23. Prerequisites:
Docker Engine 17.03 or greater
https://docs.docker.com/install/
Web browser
Hyperledger Composer Playground
23
A user interface environment enabling
Quick and easy definition, configuration, deployment, and testing of business networks
※ It reduces the complexity of getting a business
network defined, validated, and tested.
http://composer-playground.mybluemix.net/
24. Playground Basic Model Network
24
※ Hello World Business Network Model Definition and Test
- Model files (.cto) - defines the hello world business network
- JavaScript files (.js) - contain transaction processor function that print
“Hello world” to the console.
25. My First Business Network on
Playground
25
Business Network card is a combination of
an identity, a connection profile, and metadata.
※ the metadata optionally containing the name of
the business network to connect to.
30. 30
Hyperledger Composer Modeling Language
Hyperledger Composer includes an object-oriented modeling language (CTO)
Used to define the domain model for a business network definition.
CTO file is composed of the following elements:
① A single namespace - All resource declarations within the file are implicitly in this namespace
② A set of resource definitions, encompassing assets, transactions, participants, and events
③ Optional import declarations that import resources from other namespaces
※ A class in Hyperledger Composer is referred to as a Resource Definition, therefore an asset instance has an Asset Definition.
※ Concepts are abstract classes that are not assets, participants or transactions.
They are typically contained by an asset, participant or transaction.
31. My First Business Network Definition
31
The namespace in which resources are defined.
※ A name must be unique within the namespace
The property (indicated by lowercase "o") of
type String, and uniquely identifies an asset
(as indicated by identified by).
The reference (indicated by -->) to Contract
is called a relationship, and is one-way
(unidirectional.)
33. My First Business Network Definition
33
The @param and @transaction
annotations are required.
- @param tag to indicate the
parameter definition,
followed by the resource
name of the Tx which
triggers the transaction
processor function.
- @transaction tag identifies
the code as a transaction
processor function.
Script file contains transaction
processor functions implementing
the transactions defined in the
Business Network Definition's
model files.
34. My First Business Network Definition
34
Access Control Language (ACL)
provides declarative access control
over the elements of the domain
model.
ACL rules determine which users/roles
are permitted to create, read, update or
delete elements in a business network's
domain model.
45. My First Business Network – Transaction
submission
45
※ For simplicity in our demo,
specify the transaction ID to
pass to it as parameter.
Select the corresponding
transaction to submit.
51. Car Auction Business Network
51
The new business network
definition project has been
created.
Admin ID Card provides all
of the information needed to
connect/deploy the business
network definition to a
distributed ledger.
※ kcaraution-net is composed of :
- Model files (.cto) - define the business domain for a business network
- JavaScript files (.js) - contain transaction processor functions.
- Access Control file (.acl) - contains a set of access control rules that
define the rights of the different participants in the business network.
52. Car Auction Business Network
52
※ User ID Cards include connection profiles and credentials used to
deploy a Business Network to a distributed ledger.
57. 57
Model File - models/auction.cto
Assets and enumerated
types declaration
Participants and transactions
declarations
※ Assets, Participants and Transactions are class
definitions.
These concepts may be considered to be different
stereotypes of the class type.
A namespace defined by the
namespace of it parent file.
Enumerated types are used
to specify a type that may
have 1 or N possible
values (set of values).
74. References
74
[1] Androulaki, Elli, et al. "Hyperledger fabric: a distributed operating system for permissioned blockchains." Proceedings of the Thirteenth EuroSys
Conference. ACM, 2018. https://dl.acm.org/citation.cfm?id=3190538
[2] Vance Morris et al., " Developing a blockchain Business Network with Hyperledger composer using the IBM blockchain platform starter plan ",
IBM RedBook, May 2018 | http://www.redbooks.ibm.com/redpapers/pdfs/redp5492.pdf
[3] Bob Dill, David Smits, " Zero to Blockchain : An IBM Redbooks course ", https://www.redbooks.ibm.com/abstracts/crse0401.html?Open
[4] Hyperledger Composer Developer Tutorials, https://hyperledger.github.io/composer/latest/tutorials/developer-tutorial
[5] J Steven Perry, Hyperledger Composer basics, Part 1: Model and test your blockchain network,
https://www.ibm.com/developerworks/cloud/library/cl-model-test-your-blockchain-network-with-hyperledger-composer-playground/index.html
[6] LinuxFoundationX: LFS171x Blockchain for Business - An Introduction to Hyperledger Technologies, edx MOOC 2017
[7] Hyperledger Architecture, Volume 2: Smart Contracts - https://www.hyperledger.org/wp-content/uploads/2018/04/Hyperledger_Arch_WG_Paper_2_SmartContracts.pdf
[8] https://docs.docker.com/install/#releases | https://www.hyperledger.org/resources/publications#presentations
[9] https://developer.ibm.com/code/wp-content/uploads/sites/118/2017/09/Marbles_BlockChain_Tech_Talk1.pdf
[10] https://developer.ibm.com/blockchain/ | https://www.ibm.com/developerworks/cloud/library/cl-blockchain-basics-intro-bluemix-trs/
[11] Hyperledger Composer Introduction and Playground Tutorial (with Demo Code) , https://www.srcmake.com/home/composer (Accessed Sep. 2018)
[12] Hyperledger Composer Modeling Language, https://hyperledger.github.io/composer/latest/reference/cto_language.html
[13] https://developer.ibm.com/patterns/build-a-blockchain-network/