Safe Serialization Under Mutual Suspicion

From Erights

(Difference between revisions)
Jump to: navigation, search
(Safe Serialization Under Mutual Suspicion)
Line 8: Line 8:
* <span style="color:red">*</span>[[Safe_Serialization_Under_Mutual_Suspicion/Abstract_and_Introduction|Abstract &amp; Introduction]]
* <span style="color:red">*</span>[[Safe_Serialization_Under_Mutual_Suspicion/Abstract_and_Introduction|Abstract &amp; Introduction]]
* Deconstructing Serialization  
* Deconstructing Serialization  
-
** <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/deconstructing.html Part 1: Introducing Data-E ]
+
** <span style="color:red">*</span>[[Safe_Serialization_Under_Mutual_Suspicion/Introducing_Data_E |Part 1: Introducing Data-E ]]
** [http://www.erights.org/data/serial/jhu-paper/recog-n-build.html Part 2: "Reversing" Evaluation]
** [http://www.erights.org/data/serial/jhu-paper/recog-n-build.html Part 2: "Reversing" Evaluation]

Revision as of 21:04, 3 December 2006

Safe Serialization Under Mutual Suspicion

by Mark S. Miller

The chapters of this paper marked below with a "*" are submitted,
together with a working implementation,
to Professor Scott Smith for credit as independent study.(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.)


Personal tools
more tools