Results 74 issues of Islam Aliev

See how it's done in CocroachDB https://github.com/cockroachdb/cockroach/blob/master/docs/RFCS/20171020_inverted_indexes.md

feature
perf
area/collections

See how it's done in CocroachDB https://github.com/cockroachdb/cockroach/blob/master/docs/RFCS/20171020_inverted_indexes.md

feature
perf
area/collections
priority/high

## Relevant issue(s) Resolves #2856 ## Description This PR introduces a secure mechanism for exchanging document encryption keys in our decentralized network. It supports both whole-document and field-level encryption, enhancing...

area/network
security

Enhance our code to handle scenarios where encryption states or keys may diverge across different document versions. This task addresses potential vulnerabilities and edge cases in our current implementation, particularly...

area/collections
area/p2p
security

At the moment we don't have any test that tests merging a block with multiple heads. If we pick the first head all tests will pass. The relevant code is...

area/testing

At the moment the doc encryption key exchange is implemented in a very straightforward way: nodes directly communicate with each other over pubsub. We need to abstract that into a...

area/network
security

At the moment identity is only client-side feature. We should extend it to nodes as well so that they can also participate in document permission sharing. A node identity should...

feature
area/network

Implement a robust, end-to-end document encryption system integrated with Access Control Policies (ACP) to enhance data security and privacy in our decentralized network. Key Objectives: 1. Enable selective encryption for...

feature
epic
area/p2p
area/network
security
area/acp

Develop functionality to disable encryption for previously encrypted documents or fields during updates. This feature will allow users to transition encrypted content to an unencrypted state, maintaining data integrity and...

security

Enhance the existing encryption key exchange mechanism to support receiving keys from multiple nodes and implement robust validation of received keys. Currently, the system batches encryption key requests and retrieves...

area/p2p
area/network
security