Safe Serialization Under Mutual Suspicion
From Erights
(Difference between revisions)
(→Safe Serialization Under Mutual Suspicion) |
(→Safe Serialization Under Mutual Suspicion) |
||
Line 3: | Line 3: | ||
by Mark S. Miller | by Mark S. Miller | ||
- | The chapters of this paper marked below with a "< | + | The chapters of this paper marked below with a "<span style="color:red">*</span>" are submitted,<br /> together with a [http://www.erights.org/download/0-8-22/index.html working implementation], <br /> to Professor Scott Smith for credit as independent study.(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.) |
- | * | + | * <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/intro.html Abstract & Introduction] |
* Deconstructing Serialization | * Deconstructing Serialization | ||
- | ** | + | ** <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/deconstructing.html Part 1: Introducing Data-E ] |
** [http://www.erights.org/data/serial/jhu-paper/recog-n-build.html Part 2: "Reversing" Evaluation] | ** [http://www.erights.org/data/serial/jhu-paper/recog-n-build.html Part 2: "Reversing" Evaluation] | ||
- | * | + | * <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/exit-security.html Manipulating Authority at the Exits] |
- | * | + | * <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/subgraph-security.html Selective Transparency within the Subgraph] |
* [http://www.erights.org/data/serial/jhu-paper/entry-security.html Manipulating Identity at the Entries] | * [http://www.erights.org/data/serial/jhu-paper/entry-security.html Manipulating Identity at the Entries] | ||
* [http://www.erights.org/data/serial/jhu-paper/upgrade.html Persistence and Upgrade] | * [http://www.erights.org/data/serial/jhu-paper/upgrade.html Persistence and Upgrade] | ||
Line 18: | Line 18: | ||
* [http://www.erights.org/data/serial/jhu-paper/conclusions.html Conclusions] | * [http://www.erights.org/data/serial/jhu-paper/conclusions.html Conclusions] | ||
* [http://www.erights.org/data/serial/jhu-paper/acks-n-refs.html Acks and References] | * [http://www.erights.org/data/serial/jhu-paper/acks-n-refs.html Acks and References] | ||
- | * [http://www.erights.org/data/serial/jhu-paper/data-e-manual.html Appendix A: The Data-E Manual] | + | * <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/data-e-manual.html Appendix A: The Data-E Manual] |
Revision as of 22:07, 29 November 2006
Safe Serialization Under Mutual Suspicion
by Mark S. Miller
The chapters of this paper marked below with a "*" are submitted,
together with a working implementation,
to Professor Scott Smith for credit as independent study.(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.)
- *Abstract & Introduction
- Deconstructing Serialization