Safe Serialization Under Mutual Suspicion
From Erights
(Difference between revisions)
(→Safe Serialization Under Mutual Suspicion) |
|||
Line 8: | Line 8: | ||
* <span style="color:red">*</span>[[Safe_Serialization_Under_Mutual_Suspicion/Abstract_and_Introduction|Abstract & Introduction]] | * <span style="color:red">*</span>[[Safe_Serialization_Under_Mutual_Suspicion/Abstract_and_Introduction|Abstract & Introduction]] | ||
* Deconstructing Serialization | * Deconstructing Serialization | ||
- | ** <span style="color:red">*</span>[ | + | ** <span style="color:red">*</span>[[Safe_Serialization_Under_Mutual_Suspicion/Introducing_Data_E |Part 1: Introducing Data-E ]] |
** [http://www.erights.org/data/serial/jhu-paper/recog-n-build.html Part 2: "Reversing" Evaluation] | ** [http://www.erights.org/data/serial/jhu-paper/recog-n-build.html Part 2: "Reversing" Evaluation] | ||
Revision as of 21:04, 3 December 2006
Safe Serialization Under Mutual Suspicion
by Mark S. Miller
The chapters of this paper marked below with a "*" are submitted,
together with a working implementation,
to Professor Scott Smith for credit as independent study.(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.)
- *Abstract & Introduction
- Deconstructing Serialization