Safe Serialization Under Mutual Suspicion

From Erights

(Difference between revisions)
Jump to: navigation, search
(Switched sense of red marking)
Line 1: Line 1:
-
=Safe Serialization Under Mutual Suspicion=
+
The chapters marked below with a "<span style="color:red">*</span>" are not yet in a coherent state. Read those at your own risk. The rest are in a readable state, though still in need of much improvement.
-
by Mark S. Miller
 
-
The chapters of this paper marked below with a "<span style="color:red">*</span>" are in a readable state, though still in need of much improvement. The rest are not yet in a coherent state. Read those at your own risk.
+
* [[Safe_Serialization_Under_Mutual_Suspicion/Abstract_and_Introduction|Abstract &amp; Introduction]]
-
 
+
-
 
+
-
* <span style="color:red">*</span>[[Safe_Serialization_Under_Mutual_Suspicion/Abstract_and_Introduction|Abstract &amp; Introduction]]
+
* Deconstructing Serialization  
* Deconstructing Serialization  
-
** <span style="color:red">*</span>[[Safe_Serialization_Under_Mutual_Suspicion/Introducing_Data_E |Part 1: Introducing Data-E ]]
+
** [[Safe_Serialization_Under_Mutual_Suspicion/Introducing_Data_E |Part 1: Introducing Data-E ]]
** [http://www.erights.org/data/serial/jhu-paper/recog-n-build.html Part 2: "Reversing" Evaluation]
** [http://www.erights.org/data/serial/jhu-paper/recog-n-build.html Part 2: "Reversing" Evaluation]
-
* <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/exit-security.html Manipulating Authority at the Exits]
+
* [http://www.erights.org/data/serial/jhu-paper/exit-security.html Manipulating Authority at the Exits]
-
* <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/subgraph-security.html Selective Transparency within the Subgraph]
+
* [http://www.erights.org/data/serial/jhu-paper/subgraph-security.html Selective Transparency within the Subgraph]
-
* [http://www.erights.org/data/serial/jhu-paper/entry-security.html Manipulating Identity at the Entries]
+
* <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/entry-security.html Manipulating Identity at the Entries]
* [http://www.erights.org/data/serial/jhu-paper/upgrade.html Persistence and Upgrade]
* [http://www.erights.org/data/serial/jhu-paper/upgrade.html Persistence and Upgrade]
-
* [http://www.erights.org/data/serial/jhu-paper/related.html Related Work]
+
* <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/related.html Related Work]
-
* [http://www.erights.org/data/serial/jhu-paper/conclusions.html Conclusions]
+
* <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/conclusions.html Conclusions]
-
* [http://www.erights.org/data/serial/jhu-paper/acks-n-refs.html Acks and References]
+
* <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/acks-n-refs.html Acks and References]
-
* <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/data-e-manual.html Appendix A: The Data-E Manual]
+
* [http://www.erights.org/data/serial/jhu-paper/data-e-manual.html Appendix A: The Data-E Manual]

Revision as of 03:44, 23 December 2006

The chapters marked below with a "*" are not yet in a coherent state. Read those at your own risk. The rest are in a readable state, though still in need of much improvement.


Personal tools
more tools