Safe Serialization Under Mutual Suspicion
From Erights
(Difference between revisions)
(adding an new page) |
|||
Line 1: | Line 1: | ||
- | The chapters marked below with a "< | + | {| width="100%" |
- | + | |- valign="TOP" | |
- | + | | | |
- | + | {| width="100%" | |
- | + | | align="LEFT" valign="top" | | |
- | + | {| cellpadding="2" | |
- | + | | colspan="3" align="left" valign="top" | | |
- | + | [http://www.erights.org/index.html [[Image:e-lambda.gif|ERights Home]]]/ [http://www.erights.org/data/index.html data] / [http://www.erights.org/data/serial/index.html serial] | |
- | + | |- | |
- | + | | align="right" valign="top" | | |
- | + | [[Image:prev-gray.gif|No Previous Sibling]] | |
- | + | | align="left" valign="bottom" | | |
- | + | [http://www.erights.org/data/serial/jhu-paper/intro.html [[Image:first.gif|1st child: Introduction - Safe Serialization]]] | |
- | + | | align="left" valign="top" | | |
- | + | [[Image:next-gray.gif|No Next Sibling]] | |
- | + | |} | |
+ | | rowspan="2" align="RIGHT" | | ||
+ | <font size="7"><font size="7">'''Safe Serialization<br /> Under Mutual Suspicion'''</font></font> | ||
+ | |- | ||
+ | | align="LEFT" valign="top" | | ||
+ | {| width="100%" | ||
+ | | align="LEFT" valign="top" | | ||
+ | |} | ||
+ | |} | ||
+ | ---- | ||
+ | <center>by Mark S. Miller</center><center>The chapters of this paper marked below with a "<tt>-></tt>" are submitted,<br /> together with a [http://www.erights.org/download/0-8-22/index.html working implementation], <br /> to Professor Scott Smith for credit as independent study.</center><center>(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.) </center>{| cellpadding="12" | ||
+ | | <tt>-></tt> | ||
+ | | | ||
+ | [http://www.erights.org/data/serial/jhu-paper/intro.html Abstract & Introduction] | ||
+ | |- | ||
+ | | <tt>-></tt> | ||
+ | | | ||
+ | Deconstructing Serialization<br />[http://www.erights.org/data/serial/jhu-paper/deconstructing.html Part 1: Introducing Data-E ]<br />[http://www.erights.org/data/serial/jhu-paper/recog-n-build.html Part 2: "Reversing" Evaluation] | ||
+ | |- | ||
+ | | <tt>-></tt> | ||
+ | | | ||
+ | [http://www.erights.org/data/serial/jhu-paper/exit-security.html Manipulating Authority at the Exits] | ||
+ | |- | ||
+ | | <tt>-></tt> | ||
+ | | | ||
+ | [http://www.erights.org/data/serial/jhu-paper/subgraph-security.html Selective Transparency within the Subgraph] | ||
+ | |- | ||
+ | | | ||
+ | | | ||
+ | [http://www.erights.org/data/serial/jhu-paper/entry-security.html Manipulating Identity at the Entries] | ||
+ | |- | ||
+ | | | ||
+ | | | ||
+ | [http://www.erights.org/data/serial/jhu-paper/upgrade.html Persistence and Upgrade] | ||
+ | |- | ||
+ | | | ||
+ | | | ||
+ | [http://www.erights.org/data/serial/jhu-paper/related.html Related Work] | ||
+ | |- | ||
+ | | | ||
+ | | | ||
+ | [http://www.erights.org/data/serial/jhu-paper/conclusions.html Conclusions] | ||
+ | |- | ||
+ | | | ||
+ | | | ||
+ | [http://www.erights.org/data/serial/jhu-paper/acks-n-refs.html Acks and References] | ||
+ | |- | ||
+ | | <tt>-></tt> | ||
+ | | | ||
+ | [http://www.erights.org/data/serial/jhu-paper/data-e-manual.html Appendix A: The Data-E Manual] | ||
+ | |} | ||
+ | | rowspan="2" width="10%" align="right" valign="bottom" | | ||
+ | {| cellspacing="6" cellpadding="12" | ||
+ | | | ||
+ | |} | ||
+ | |- valign="TOP" | ||
+ | | | ||
+ | ---- | ||
+ | Unless stated otherwise, all text on this page which is either unattributed or by Mark S. Miller is hereby placed in the public domain. <center>{| width="100%" cellpadding="4" | ||
+ | | | ||
+ | {| cellpadding="2" align="left" | ||
+ | | colspan="3" align="left" valign="top" | | ||
+ | [http://www.erights.org/index.html [[Image:e-lambda.gif|ERights Home]]]/ [http://www.erights.org/data/index.html data] / [http://www.erights.org/data/serial/index.html serial] | ||
+ | |- | ||
+ | | align="right" valign="top" | | ||
+ | [[Image:prev-gray.gif|No Previous Sibling]] | ||
+ | | align="left" valign="bottom" | | ||
+ | [http://www.erights.org/data/serial/jhu-paper/intro.html [[Image:first.gif|1st child: Introduction - Safe Serialization]]] | ||
+ | | align="left" valign="top" | | ||
+ | [[Image:next-gray.gif|No Next Sibling]] | ||
+ | |} | ||
+ | | | ||
+ | {| border="3" cellspacing="3" cellpadding="6" align="center" | ||
+ | | | ||
+ | <center><font size="-1">[http://www.erights.org/elib/index.html ELib] [http://www.erights.org/elang/index.html E Language] [http://www.erights.org/smart-contracts/index.html Smart Contracts] [http://www.erights.org/related.html Related] </font></center> | ||
+ | |- | ||
+ | | | ||
+ | <center><font size="-1">[http://www.erights.org/download/index.html Download] [http://mumble.net/e/faq.html FAQ] [http://www.erights.org/javadoc/index.html API] [http://www.eros-os.org/pipermail/e-lang/ Mail Archive] [http://www.erights.org/donate.html Donate]</font></center> | ||
+ | |} | ||
+ | | | ||
+ | <div align="right">[https://sourceforge.net/tracker/?func=add&group_id=75274&atid=551529 ''report bug''] (including [http://validator.w3.org/check/referer invalid html])[http://www.epic.org/crypto/ [[Image:key.gif|Golden Key Campaign]]] [http://www.eff.org/br/ [[Image:ribbon.gif|Blue Ribbon Campaign]]]</div> | ||
+ | |- | ||
+ | | colspan="3" | | ||
+ | {| width="100%" | ||
+ | | align="LEFT" valign="top" | | ||
+ | |} | ||
+ | |}</center> | ||
+ | |} |
Revision as of 22:01, 29 November 2006
together with a working implementation, to Professor Scott Smith for credit as independent study. | -> | |||||||||||
-> |
Deconstructing Serialization | |||||||||||
-> | ||||||||||||
-> | ||||||||||||
-> |
| rowspan="2" width="10%" align="right" valign="bottom" |
|- valign="TOP" |
Unless stated otherwise, all text on this page which is either unattributed or by Mark S. Miller is hereby placed in the public domain.
|
|
<center>ELib E Language Smart Contracts Related |
|
|
|- | colspan="3" |
|}</center> |}