{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2012:5YHMHO3EM6GHMRC5L7BCM34LHC","short_pith_number":"pith:5YHMHO3E","schema_version":"1.0","canonical_sha256":"ee0ec3bb64678c76445d5fc2266f8b3880459c029ec8e9ec198e918f94666e33","source":{"kind":"arxiv","id":"1202.0885","version":1},"attestation_state":"computed","paper":{"title":"The Impact of Secure OSs on Internet Security: What Cyber-Insurers Need to Know","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Pan Hui, Ranjan Pal","submitted_at":"2012-02-04T09:51:44Z","abstract_excerpt":"In recent years, researchers have proposed \\emph{cyber-insurance} as a suitable risk-management technique for enhancing security in Internet-like distributed systems. However, amongst other factors, information asymmetry between the insurer and the insured, and the inter-dependent and correlated nature of cyber risks have contributed in a big way to the failure of cyber-insurance markets. Security experts have argued in favor of operating system (OS) platform switching (ex., from Windows to Unix-based OSs) or secure OS adoption as being one of the techniques that can potentially mitigate the p"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1202.0885","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2012-02-04T09:51:44Z","cross_cats_sorted":[],"title_canon_sha256":"b0391a604e08992f1287a4626c777d4e4228d366000304bd2ed27ffc803efeca","abstract_canon_sha256":"751ffb8d0f1591f9a4a82160c44ba22d2c5a1f4a61ad02d3a03aff07beff8bc0"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T04:03:05.895534Z","signature_b64":"hJS1kSVMNztKlaLydLz53SrnD5KcwTXwKmUhUF5rngR21/jkb/gCAiMmlu1VKO4EmZS5tb4Y2CHGZpGbaWSXDA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"ee0ec3bb64678c76445d5fc2266f8b3880459c029ec8e9ec198e918f94666e33","last_reissued_at":"2026-05-18T04:03:05.894844Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T04:03:05.894844Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"The Impact of Secure OSs on Internet Security: What Cyber-Insurers Need to Know","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Pan Hui, Ranjan Pal","submitted_at":"2012-02-04T09:51:44Z","abstract_excerpt":"In recent years, researchers have proposed \\emph{cyber-insurance} as a suitable risk-management technique for enhancing security in Internet-like distributed systems. However, amongst other factors, information asymmetry between the insurer and the insured, and the inter-dependent and correlated nature of cyber risks have contributed in a big way to the failure of cyber-insurance markets. Security experts have argued in favor of operating system (OS) platform switching (ex., from Windows to Unix-based OSs) or secure OS adoption as being one of the techniques that can potentially mitigate the p"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1202.0885","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1202.0885","created_at":"2026-05-18T04:03:05.894935+00:00"},{"alias_kind":"arxiv_version","alias_value":"1202.0885v1","created_at":"2026-05-18T04:03:05.894935+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1202.0885","created_at":"2026-05-18T04:03:05.894935+00:00"},{"alias_kind":"pith_short_12","alias_value":"5YHMHO3EM6GH","created_at":"2026-05-18T12:26:56.085431+00:00"},{"alias_kind":"pith_short_16","alias_value":"5YHMHO3EM6GHMRC5","created_at":"2026-05-18T12:26:56.085431+00:00"},{"alias_kind":"pith_short_8","alias_value":"5YHMHO3E","created_at":"2026-05-18T12:26:56.085431+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/5YHMHO3EM6GHMRC5L7BCM34LHC","json":"https://pith.science/pith/5YHMHO3EM6GHMRC5L7BCM34LHC.json","graph_json":"https://pith.science/api/pith-number/5YHMHO3EM6GHMRC5L7BCM34LHC/graph.json","events_json":"https://pith.science/api/pith-number/5YHMHO3EM6GHMRC5L7BCM34LHC/events.json","paper":"https://pith.science/paper/5YHMHO3E"},"agent_actions":{"view_html":"https://pith.science/pith/5YHMHO3EM6GHMRC5L7BCM34LHC","download_json":"https://pith.science/pith/5YHMHO3EM6GHMRC5L7BCM34LHC.json","view_paper":"https://pith.science/paper/5YHMHO3E","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1202.0885&json=true","fetch_graph":"https://pith.science/api/pith-number/5YHMHO3EM6GHMRC5L7BCM34LHC/graph.json","fetch_events":"https://pith.science/api/pith-number/5YHMHO3EM6GHMRC5L7BCM34LHC/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/5YHMHO3EM6GHMRC5L7BCM34LHC/action/timestamp_anchor","attest_storage":"https://pith.science/pith/5YHMHO3EM6GHMRC5L7BCM34LHC/action/storage_attestation","attest_author":"https://pith.science/pith/5YHMHO3EM6GHMRC5L7BCM34LHC/action/author_attestation","sign_citation":"https://pith.science/pith/5YHMHO3EM6GHMRC5L7BCM34LHC/action/citation_signature","submit_replication":"https://pith.science/pith/5YHMHO3EM6GHMRC5L7BCM34LHC/action/replication_record"}},"created_at":"2026-05-18T04:03:05.894935+00:00","updated_at":"2026-05-18T04:03:05.894935+00:00"}