ERights Home data / serial 
No Previous Sibling 1st child: Introduction - Safe Serialization No Next Sibling

Safe Serialization
Under Mutual Suspicion


This paper is moving here.

by Mark S. Miller

The chapters of this paper marked below with a "->" are submitted,
together with a working implementation,
to Professor Scott Smith for credit as independent study.

(At the present time, the rest are not yet in a coherent state. Read farther at your own risk.)

-> Abstract & Introduction  
-> Deconstructing Serialization
    Part 1: Introducing Data-E
    Part 2: "Reversing" Evaluation
 
-> Manipulating Authority at the Exits  
-> Selective Transparency within the Subgraph  
Manipulating Identity at the Entries  
Persistence and Upgrade  
Related Work  
Conclusions  
Acks and References  
-> Appendix A: The Data-E Manual  

 

 
Unless stated otherwise, all text on this page which is either unattributed or by Mark S. Miller is hereby placed in the public domain.
ERights Home data / serial 
No Previous Sibling 1st child: Introduction - Safe Serialization No Next Sibling
Download    FAQ    API    Mail Archive    Donate

report bug (including invalid html)

Golden Key Campaign Blue Ribbon Campaign