Safe Serialization Under Mutual Suspicion

From Erights

(Difference between revisions)
Jump to: navigation, search
(Safe Serialization Under Mutual Suspicion)
Line 1: Line 1:
-
 
=Safe Serialization Under Mutual Suspicion=
=Safe Serialization Under Mutual Suspicion=
Line 6: Line 5:
The chapters of this paper marked below with a "<tt>-></tt>" are submitted,<br /> together with a [http://www.erights.org/download/0-8-22/index.html working implementation], <br /> to Professor Scott Smith for credit as independent study.</center><center>(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.)  
The chapters of this paper marked below with a "<tt>-></tt>" are submitted,<br /> together with a [http://www.erights.org/download/0-8-22/index.html working implementation], <br /> to Professor Scott Smith for credit as independent study.</center><center>(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.)  
-
{| cellpadding="12"
+
 
-
| <tt>-></tt>
+
* ->[http://www.erights.org/data/serial/jhu-paper/intro.html Abstract & Introduction]
-
|
+
* Deconstructing Serialization
-
[http://www.erights.org/data/serial/jhu-paper/intro.html Abstract & Introduction]
+
** ->[http://www.erights.org/data/serial/jhu-paper/deconstructing.html Part 1: Introducing Data-E ]
-
|-
+
** [http://www.erights.org/data/serial/jhu-paper/recog-n-build.html Part 2: "Reversing" Evaluation]
-
| <tt>-></tt>
+
 
-
|
+
* ->[http://www.erights.org/data/serial/jhu-paper/exit-security.html Manipulating Authority at the Exits]
-
Deconstructing Serialization<br />[http://www.erights.org/data/serial/jhu-paper/deconstructing.html Part 1: Introducing Data-E ]<br />[http://www.erights.org/data/serial/jhu-paper/recog-n-build.html Part 2: "Reversing" Evaluation]
+
* ->[http://www.erights.org/data/serial/jhu-paper/subgraph-security.html Selective Transparency within the Subgraph]
-
|-
+
* [http://www.erights.org/data/serial/jhu-paper/entry-security.html Manipulating Identity at the Entries]
-
| <tt>-></tt>
+
* [http://www.erights.org/data/serial/jhu-paper/upgrade.html Persistence and Upgrade]
-
|
+
* [http://www.erights.org/data/serial/jhu-paper/related.html Related Work]
-
[http://www.erights.org/data/serial/jhu-paper/exit-security.html Manipulating Authority at the Exits]
+
* [http://www.erights.org/data/serial/jhu-paper/conclusions.html Conclusions]
-
|-
+
* [http://www.erights.org/data/serial/jhu-paper/acks-n-refs.html Acks and References]
-
| <tt>-></tt>
+
* [http://www.erights.org/data/serial/jhu-paper/data-e-manual.html Appendix A: The Data-E Manual]
-
|
+
-
[http://www.erights.org/data/serial/jhu-paper/subgraph-security.html Selective Transparency within the Subgraph]
+
-
|-
+
-
|
+
-
|
+
-
[http://www.erights.org/data/serial/jhu-paper/entry-security.html Manipulating Identity at the Entries]
+
-
|-
+
-
|
+
-
|
+
-
[http://www.erights.org/data/serial/jhu-paper/upgrade.html Persistence and Upgrade]
+
-
|-
+
-
|
+
-
|
+
-
[http://www.erights.org/data/serial/jhu-paper/related.html Related Work]
+
-
|-
+
-
|
+
-
|
+
-
[http://www.erights.org/data/serial/jhu-paper/conclusions.html Conclusions]
+
-
|-
+
-
|
+
-
|
+
-
[http://www.erights.org/data/serial/jhu-paper/acks-n-refs.html Acks and References]
+
-
|-
+
-
| <tt>-></tt>
+
-
|
+
-
[http://www.erights.org/data/serial/jhu-paper/data-e-manual.html Appendix A: The Data-E Manual]
+
-
|}
+
-
| rowspan="2" width="10%" align="right" valign="bottom" |
+
-
{| cellspacing="6" cellpadding="12"
+
-
|
+
-
|}
+
-
|- valign="TOP"
+
-
|
+

Revision as of 22:05, 29 November 2006

Safe Serialization Under Mutual Suspicion

by Mark S. Miller

The chapters of this paper marked below with a "->" are submitted,
together with a working implementation,
to Professor Scott Smith for credit as independent study.</center>
(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.)


Personal tools
more tools