Safe Serialization Under Mutual Suspicion
From Erights
(Difference between revisions)
(→Safe Serialization Under Mutual Suspicion) |
|||
Line 1: | Line 1: | ||
- | |||
=Safe Serialization Under Mutual Suspicion= | =Safe Serialization Under Mutual Suspicion= | ||
Line 6: | Line 5: | ||
The chapters of this paper marked below with a "<tt>-></tt>" are submitted,<br /> together with a [http://www.erights.org/download/0-8-22/index.html working implementation], <br /> to Professor Scott Smith for credit as independent study.</center><center>(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.) | The chapters of this paper marked below with a "<tt>-></tt>" are submitted,<br /> together with a [http://www.erights.org/download/0-8-22/index.html working implementation], <br /> to Professor Scott Smith for credit as independent study.</center><center>(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.) | ||
- | + | ||
- | + | * ->[http://www.erights.org/data/serial/jhu-paper/intro.html Abstract & Introduction] | |
- | + | * Deconstructing Serialization | |
- | [http://www.erights.org/data/serial/jhu-paper/intro.html Abstract & Introduction] | + | ** ->[http://www.erights.org/data/serial/jhu-paper/deconstructing.html Part 1: Introducing Data-E ] |
- | + | ** [http://www.erights.org/data/serial/jhu-paper/recog-n-build.html Part 2: "Reversing" Evaluation] | |
- | + | ||
- | + | * ->[http://www.erights.org/data/serial/jhu-paper/exit-security.html Manipulating Authority at the Exits] | |
- | + | * ->[http://www.erights.org/data/serial/jhu-paper/subgraph-security.html Selective Transparency within the Subgraph] | |
- | + | * [http://www.erights.org/data/serial/jhu-paper/entry-security.html Manipulating Identity at the Entries] | |
- | + | * [http://www.erights.org/data/serial/jhu-paper/upgrade.html Persistence and Upgrade] | |
- | + | * [http://www.erights.org/data/serial/jhu-paper/related.html Related Work] | |
- | [http://www.erights.org/data/serial/jhu-paper/exit-security.html Manipulating Authority at the Exits] | + | * [http://www.erights.org/data/serial/jhu-paper/conclusions.html Conclusions] |
- | + | * [http://www.erights.org/data/serial/jhu-paper/acks-n-refs.html Acks and References] | |
- | + | * [http://www.erights.org/data/serial/jhu-paper/data-e-manual.html Appendix A: The Data-E Manual] | |
- | + | ||
- | [http://www.erights.org/data/serial/jhu-paper/subgraph-security.html Selective Transparency within the Subgraph] | + | |
- | + | ||
- | + | ||
- | + | ||
- | [http://www.erights.org/data/serial/jhu-paper/entry-security.html Manipulating Identity at the Entries] | + | |
- | + | ||
- | + | ||
- | + | ||
- | [http://www.erights.org/data/serial/jhu-paper/upgrade.html Persistence and Upgrade] | + | |
- | + | ||
- | + | ||
- | + | ||
- | [http://www.erights.org/data/serial/jhu-paper/related.html Related Work] | + | |
- | + | ||
- | + | ||
- | + | ||
- | [http://www.erights.org/data/serial/jhu-paper/conclusions.html Conclusions] | + | |
- | + | ||
- | + | ||
- | + | ||
- | [http://www.erights.org/data/serial/jhu-paper/acks-n-refs.html Acks and References] | + | |
- | + | ||
- | + | ||
- | + | ||
- | [http://www.erights.org/data/serial/jhu-paper/data-e-manual.html Appendix A: The Data-E Manual] | + | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + |
Revision as of 22:05, 29 November 2006
Safe Serialization Under Mutual Suspicion
by Mark S. Miller
The chapters of this paper marked below with a "->" are submitted,together with a working implementation,
to Professor Scott Smith for credit as independent study.</center>
- ->Abstract & Introduction
- Deconstructing Serialization