Safe Serialization Under Mutual Suspicion
From Erights
(Difference between revisions)
(adding an new page) |
|||
| Line 1: | Line 1: | ||
| - | The chapters marked below with a "< | + | {| width="100%" |
| - | + | |- valign="TOP" | |
| - | + | | | |
| - | + | {| width="100%" | |
| - | + | | align="LEFT" valign="top" | | |
| - | + | {| cellpadding="2" | |
| - | + | | colspan="3" align="left" valign="top" | | |
| - | + | [http://www.erights.org/index.html [[Image:e-lambda.gif|ERights Home]]]/ [http://www.erights.org/data/index.html data] / [http://www.erights.org/data/serial/index.html serial] | |
| - | + | |- | |
| - | + | | align="right" valign="top" | | |
| - | + | [[Image:prev-gray.gif|No Previous Sibling]] | |
| - | + | | align="left" valign="bottom" | | |
| - | + | [http://www.erights.org/data/serial/jhu-paper/intro.html [[Image:first.gif|1st child: Introduction - Safe Serialization]]] | |
| - | + | | align="left" valign="top" | | |
| - | + | [[Image:next-gray.gif|No Next Sibling]] | |
| - | + | |} | |
| + | | rowspan="2" align="RIGHT" | | ||
| + | <font size="7"><font size="7">'''Safe Serialization<br /> Under Mutual Suspicion'''</font></font> | ||
| + | |- | ||
| + | | align="LEFT" valign="top" | | ||
| + | {| width="100%" | ||
| + | | align="LEFT" valign="top" | | ||
| + | |} | ||
| + | |} | ||
| + | ---- | ||
| + | <center>by Mark S. Miller</center><center>The chapters of this paper marked below with a "<tt>-></tt>" are submitted,<br /> together with a [http://www.erights.org/download/0-8-22/index.html working implementation], <br /> to Professor Scott Smith for credit as independent study.</center><center>(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.) </center>{| cellpadding="12" | ||
| + | | <tt>-></tt> | ||
| + | | | ||
| + | [http://www.erights.org/data/serial/jhu-paper/intro.html Abstract & Introduction] | ||
| + | |- | ||
| + | | <tt>-></tt> | ||
| + | | | ||
| + | Deconstructing Serialization<br />[http://www.erights.org/data/serial/jhu-paper/deconstructing.html Part 1: Introducing Data-E ]<br />[http://www.erights.org/data/serial/jhu-paper/recog-n-build.html Part 2: "Reversing" Evaluation] | ||
| + | |- | ||
| + | | <tt>-></tt> | ||
| + | | | ||
| + | [http://www.erights.org/data/serial/jhu-paper/exit-security.html Manipulating Authority at the Exits] | ||
| + | |- | ||
| + | | <tt>-></tt> | ||
| + | | | ||
| + | [http://www.erights.org/data/serial/jhu-paper/subgraph-security.html Selective Transparency within the Subgraph] | ||
| + | |- | ||
| + | | | ||
| + | | | ||
| + | [http://www.erights.org/data/serial/jhu-paper/entry-security.html Manipulating Identity at the Entries] | ||
| + | |- | ||
| + | | | ||
| + | | | ||
| + | [http://www.erights.org/data/serial/jhu-paper/upgrade.html Persistence and Upgrade] | ||
| + | |- | ||
| + | | | ||
| + | | | ||
| + | [http://www.erights.org/data/serial/jhu-paper/related.html Related Work] | ||
| + | |- | ||
| + | | | ||
| + | | | ||
| + | [http://www.erights.org/data/serial/jhu-paper/conclusions.html Conclusions] | ||
| + | |- | ||
| + | | | ||
| + | | | ||
| + | [http://www.erights.org/data/serial/jhu-paper/acks-n-refs.html Acks and References] | ||
| + | |- | ||
| + | | <tt>-></tt> | ||
| + | | | ||
| + | [http://www.erights.org/data/serial/jhu-paper/data-e-manual.html Appendix A: The Data-E Manual] | ||
| + | |} | ||
| + | | rowspan="2" width="10%" align="right" valign="bottom" | | ||
| + | {| cellspacing="6" cellpadding="12" | ||
| + | | | ||
| + | |} | ||
| + | |- valign="TOP" | ||
| + | | | ||
| + | ---- | ||
| + | Unless stated otherwise, all text on this page which is either unattributed or by Mark S. Miller is hereby placed in the public domain. <center>{| width="100%" cellpadding="4" | ||
| + | | | ||
| + | {| cellpadding="2" align="left" | ||
| + | | colspan="3" align="left" valign="top" | | ||
| + | [http://www.erights.org/index.html [[Image:e-lambda.gif|ERights Home]]]/ [http://www.erights.org/data/index.html data] / [http://www.erights.org/data/serial/index.html serial] | ||
| + | |- | ||
| + | | align="right" valign="top" | | ||
| + | [[Image:prev-gray.gif|No Previous Sibling]] | ||
| + | | align="left" valign="bottom" | | ||
| + | [http://www.erights.org/data/serial/jhu-paper/intro.html [[Image:first.gif|1st child: Introduction - Safe Serialization]]] | ||
| + | | align="left" valign="top" | | ||
| + | [[Image:next-gray.gif|No Next Sibling]] | ||
| + | |} | ||
| + | | | ||
| + | {| border="3" cellspacing="3" cellpadding="6" align="center" | ||
| + | | | ||
| + | <center><font size="-1">[http://www.erights.org/elib/index.html ELib] [http://www.erights.org/elang/index.html E Language] [http://www.erights.org/smart-contracts/index.html Smart Contracts] [http://www.erights.org/related.html Related] </font></center> | ||
| + | |- | ||
| + | | | ||
| + | <center><font size="-1">[http://www.erights.org/download/index.html Download] [http://mumble.net/e/faq.html FAQ] [http://www.erights.org/javadoc/index.html API] [http://www.eros-os.org/pipermail/e-lang/ Mail Archive] [http://www.erights.org/donate.html Donate]</font></center> | ||
| + | |} | ||
| + | | | ||
| + | <div align="right">[https://sourceforge.net/tracker/?func=add&group_id=75274&atid=551529 ''report bug''] (including [http://validator.w3.org/check/referer invalid html])[http://www.epic.org/crypto/ [[Image:key.gif|Golden Key Campaign]]] [http://www.eff.org/br/ [[Image:ribbon.gif|Blue Ribbon Campaign]]]</div> | ||
| + | |- | ||
| + | | colspan="3" | | ||
| + | {| width="100%" | ||
| + | | align="LEFT" valign="top" | | ||
| + | |} | ||
| + | |}</center> | ||
| + | |} | ||
Revision as of 22:01, 29 November 2006
together with a working implementation, to Professor Scott Smith for credit as independent study. | -> | |||||||||||
| -> |
Deconstructing Serialization | |||||||||||
| -> | ||||||||||||
| -> | ||||||||||||
| -> | ||||||||||||
| rowspan="2" width="10%" align="right" valign="bottom" |
|- valign="TOP" |
Unless stated otherwise, all text on this page which is either unattributed or by Mark S. Miller is hereby placed in the public domain.
|
|
| <center>ELib E Language Smart Contracts Related |
|
|
|
|- | colspan="3" |
|}</center> |}

