Safe Serialization Under Mutual Suspicion
From Erights
(Difference between revisions)
(→Safe Serialization Under Mutual Suspicion) |
(→Safe Serialization Under Mutual Suspicion) |
||
Line 3: | Line 3: | ||
by Mark S. Miller | by Mark S. Miller | ||
- | The chapters of this paper marked below with a "<tt>-></tt>" are submitted,<br /> together with a [http://www.erights.org/download/0-8-22/index.html working implementation], <br /> to Professor Scott Smith for credit as independent study. | + | The chapters of this paper marked below with a "<tt>-></tt>" are submitted,<br /> together with a [http://www.erights.org/download/0-8-22/index.html working implementation], <br /> to Professor Scott Smith for credit as independent study.(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.) |
Revision as of 22:06, 29 November 2006
Safe Serialization Under Mutual Suspicion
by Mark S. Miller
The chapters of this paper marked below with a "->" are submitted,
together with a working implementation,
to Professor Scott Smith for credit as independent study.(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.)
- ->Abstract & Introduction
- Deconstructing Serialization