Safe Serialization Under Mutual Suspicion

From Erights

(Difference between revisions)
Jump to: navigation, search
(adding an new page)
Line 1: Line 1:
-
The chapters marked below with a "<span style="color:red">*</span>" are not yet in a coherent state. Read those at your own risk. The rest are in a readable state, though still in need of much improvement.
+
{| width="100%"
-
 
+
|- valign="TOP"
-
 
+
|
-
* [[Safe_Serialization_Under_Mutual_Suspicion/Abstract_and_Introduction|Abstract &amp; Introduction]]
+
{| width="100%"
-
* Deconstructing Serialization  
+
| align="LEFT" valign="top" |
-
** [[Safe_Serialization_Under_Mutual_Suspicion/Introducing_Data_E |Part 1: Introducing Data-E ]]
+
{| cellpadding="2"
-
** [[Safe_Serialization_Under_Mutual_Suspicion/"Reversing"_Evaluation |Part 2: "Reversing" Evaluation ]]
+
| colspan="3" align="left" valign="top" |
-
 
+
[http://www.erights.org/index.html [[Image:e-lambda.gif|ERights Home]]]/ [http://www.erights.org/data/index.html data] / [http://www.erights.org/data/serial/index.html serial]
-
* [http://www.erights.org/data/serial/jhu-paper/exit-security.html Manipulating Authority at the Exits]
+
|-
-
* [http://www.erights.org/data/serial/jhu-paper/subgraph-security.html Selective Transparency within the Subgraph]
+
| align="right" valign="top" |
-
* <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/entry-security.html Manipulating Identity at the Entries]
+
[[Image:prev-gray.gif|No Previous Sibling]]
-
* [http://www.erights.org/data/serial/jhu-paper/upgrade.html Persistence and Upgrade]
+
| align="left" valign="bottom" |
-
* <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/related.html Related Work]
+
[http://www.erights.org/data/serial/jhu-paper/intro.html [[Image:first.gif|1st child: Introduction - Safe Serialization]]]
-
* <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/conclusions.html Conclusions]
+
| align="left" valign="top" |
-
* <span style="color:red">*</span>[http://www.erights.org/data/serial/jhu-paper/acks-n-refs.html Acks and References]
+
[[Image:next-gray.gif|No Next Sibling]]
-
* [http://www.erights.org/data/serial/jhu-paper/data-e-manual.html Appendix A: The Data-E Manual]
+
|}
 +
| rowspan="2" align="RIGHT" |
 +
<font size="7"><font size="7">'''Safe Serialization<br /> Under Mutual Suspicion'''</font></font>
 +
|-
 +
| align="LEFT" valign="top" |
 +
{| width="100%"
 +
| align="LEFT" valign="top" |
 +
|}
 +
|}
 +
----
 +
<center>by Mark S. Miller</center><center>The chapters of this paper marked below with a "<tt>-></tt>" are submitted,<br /> together with a [http://www.erights.org/download/0-8-22/index.html working implementation], <br /> to Professor Scott Smith for credit as independent study.</center><center>(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.) </center>{| cellpadding="12"
 +
| <tt>-></tt>
 +
|
 +
[http://www.erights.org/data/serial/jhu-paper/intro.html Abstract & Introduction]
 +
|-
 +
| <tt>-></tt>
 +
|
 +
Deconstructing Serialization<br />[http://www.erights.org/data/serial/jhu-paper/deconstructing.html Part 1: Introducing Data-E ]<br />[http://www.erights.org/data/serial/jhu-paper/recog-n-build.html Part 2: "Reversing" Evaluation]
 +
|-
 +
| <tt>-></tt>
 +
|
 +
[http://www.erights.org/data/serial/jhu-paper/exit-security.html Manipulating Authority at the Exits]
 +
|-
 +
| <tt>-></tt>
 +
|
 +
[http://www.erights.org/data/serial/jhu-paper/subgraph-security.html Selective Transparency within the Subgraph]
 +
|-
 +
|
 +
|
 +
[http://www.erights.org/data/serial/jhu-paper/entry-security.html Manipulating Identity at the Entries]
 +
|-
 +
|
 +
|
 +
[http://www.erights.org/data/serial/jhu-paper/upgrade.html Persistence and Upgrade]
 +
|-
 +
|
 +
|
 +
[http://www.erights.org/data/serial/jhu-paper/related.html Related Work]
 +
|-
 +
|
 +
|
 +
[http://www.erights.org/data/serial/jhu-paper/conclusions.html Conclusions]
 +
|-
 +
|
 +
|
 +
[http://www.erights.org/data/serial/jhu-paper/acks-n-refs.html Acks and References]
 +
|-
 +
| <tt>-></tt>
 +
|
 +
[http://www.erights.org/data/serial/jhu-paper/data-e-manual.html Appendix A: The Data-E Manual]
 +
|}
 +
| rowspan="2" width="10%" align="right" valign="bottom" |
 +
{| cellspacing="6" cellpadding="12"
 +
|
 +
|}
 +
|- valign="TOP"
 +
|
 +
----
 +
Unless stated otherwise, all text on this page which is either unattributed or by Mark S. Miller is hereby placed in the public domain. <center>{| width="100%" cellpadding="4"
 +
|
 +
{| cellpadding="2" align="left"
 +
| colspan="3" align="left" valign="top" |
 +
[http://www.erights.org/index.html [[Image:e-lambda.gif|ERights Home]]]/ [http://www.erights.org/data/index.html data] / [http://www.erights.org/data/serial/index.html serial]
 +
|-
 +
| align="right" valign="top" |
 +
[[Image:prev-gray.gif|No Previous Sibling]]
 +
| align="left" valign="bottom" |
 +
[http://www.erights.org/data/serial/jhu-paper/intro.html [[Image:first.gif|1st child: Introduction - Safe Serialization]]]
 +
| align="left" valign="top" |
 +
[[Image:next-gray.gif|No Next Sibling]]
 +
|}
 +
|
 +
{| border="3" cellspacing="3" cellpadding="6" align="center"
 +
|
 +
<center><font size="-1">[http://www.erights.org/elib/index.html ELib] [http://www.erights.org/elang/index.html E Language] [http://www.erights.org/smart-contracts/index.html Smart Contracts] [http://www.erights.org/related.html Related] </font></center>
 +
|-
 +
|
 +
<center><font size="-1">[http://www.erights.org/download/index.html Download] [http://mumble.net/e/faq.html FAQ] [http://www.erights.org/javadoc/index.html API] [http://www.eros-os.org/pipermail/e-lang/ Mail Archive] [http://www.erights.org/donate.html Donate]</font></center>
 +
|}
 +
|
 +
<div align="right">[https://sourceforge.net/tracker/?func=add&group_id=75274&atid=551529 ''report bug''] (including [http://validator.w3.org/check/referer invalid html])[http://www.epic.org/crypto/ [[Image:key.gif|Golden Key Campaign]]] [http://www.eff.org/br/ [[Image:ribbon.gif|Blue Ribbon Campaign]]]</div>
 +
|-
 +
| colspan="3" |
 +
{| width="100%"
 +
| align="LEFT" valign="top" |
 +
|}
 +
|}</center>
 +
|}

Revision as of 22:01, 29 November 2006

File:E-lambda.gif/ data / serial

File:Prev-gray.gif

File:First.gif

File:Next-gray.gif

Safe Serialization
Under Mutual Suspicion


by Mark S. Miller
The chapters of this paper marked below with a "->" are submitted,
together with a working implementation,
to Professor Scott Smith for credit as independent study.
(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.)
{| cellpadding="12"
->

Abstract & Introduction

->

Deconstructing Serialization
Part 1: Introducing Data-E
Part 2: "Reversing" Evaluation

->

Manipulating Authority at the Exits

->

Selective Transparency within the Subgraph

Manipulating Identity at the Entries

Persistence and Upgrade

Related Work

Conclusions

Acks and References

->

Appendix A: The Data-E Manual

| rowspan="2" width="10%" align="right" valign="bottom" |

|- valign="TOP" |


Unless stated otherwise, all text on this page which is either unattributed or by Mark S. Miller is hereby placed in the public domain.
{| width="100%" cellpadding="4"

|

File:E-lambda.gif/ data / serial

File:Prev-gray.gif

File:First.gif

File:Next-gray.gif

|

<center>ELib E Language Smart Contracts Related
Download FAQ API Mail Archive Donate

|

|- | colspan="3" |

|}</center> |}

Personal tools
more tools