{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2012:5YHMHO3EM6GHMRC5L7BCM34LHC","short_pith_number":"pith:5YHMHO3E","canonical_record":{"source":{"id":"1202.0885","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2012-02-04T09:51:44Z","cross_cats_sorted":[],"title_canon_sha256":"b0391a604e08992f1287a4626c777d4e4228d366000304bd2ed27ffc803efeca","abstract_canon_sha256":"751ffb8d0f1591f9a4a82160c44ba22d2c5a1f4a61ad02d3a03aff07beff8bc0"},"schema_version":"1.0"},"canonical_sha256":"ee0ec3bb64678c76445d5fc2266f8b3880459c029ec8e9ec198e918f94666e33","source":{"kind":"arxiv","id":"1202.0885","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1202.0885","created_at":"2026-05-18T04:03:05Z"},{"alias_kind":"arxiv_version","alias_value":"1202.0885v1","created_at":"2026-05-18T04:03:05Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1202.0885","created_at":"2026-05-18T04:03:05Z"},{"alias_kind":"pith_short_12","alias_value":"5YHMHO3EM6GH","created_at":"2026-05-18T12:26:56Z"},{"alias_kind":"pith_short_16","alias_value":"5YHMHO3EM6GHMRC5","created_at":"2026-05-18T12:26:56Z"},{"alias_kind":"pith_short_8","alias_value":"5YHMHO3E","created_at":"2026-05-18T12:26:56Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2012:5YHMHO3EM6GHMRC5L7BCM34LHC","target":"record","payload":{"canonical_record":{"source":{"id":"1202.0885","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2012-02-04T09:51:44Z","cross_cats_sorted":[],"title_canon_sha256":"b0391a604e08992f1287a4626c777d4e4228d366000304bd2ed27ffc803efeca","abstract_canon_sha256":"751ffb8d0f1591f9a4a82160c44ba22d2c5a1f4a61ad02d3a03aff07beff8bc0"},"schema_version":"1.0"},"canonical_sha256":"ee0ec3bb64678c76445d5fc2266f8b3880459c029ec8e9ec198e918f94666e33","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T04:03:05.895534Z","signature_b64":"hJS1kSVMNztKlaLydLz53SrnD5KcwTXwKmUhUF5rngR21/jkb/gCAiMmlu1VKO4EmZS5tb4Y2CHGZpGbaWSXDA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"ee0ec3bb64678c76445d5fc2266f8b3880459c029ec8e9ec198e918f94666e33","last_reissued_at":"2026-05-18T04:03:05.894844Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T04:03:05.894844Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1202.0885","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T04:03:05Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"8JxksUQpX93+gB9ubq5Umk6W5Hv+O5ew8c1Y/kIzopTOMPP8veA/IM4RZqgvXyHMrti7P1Xk6kcKQPuSP6IrCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T17:25:27.113785Z"},"content_sha256":"40b95978b266fd2d3ec0b6a2454b8dfd9a2cacadd8b4fe5687f0ef635077e052","schema_version":"1.0","event_id":"sha256:40b95978b266fd2d3ec0b6a2454b8dfd9a2cacadd8b4fe5687f0ef635077e052"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2012:5YHMHO3EM6GHMRC5L7BCM34LHC","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"The Impact of Secure OSs on Internet Security: What Cyber-Insurers Need to Know","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Pan Hui, Ranjan Pal","submitted_at":"2012-02-04T09:51:44Z","abstract_excerpt":"In recent years, researchers have proposed \\emph{cyber-insurance} as a suitable risk-management technique for enhancing security in Internet-like distributed systems. However, amongst other factors, information asymmetry between the insurer and the insured, and the inter-dependent and correlated nature of cyber risks have contributed in a big way to the failure of cyber-insurance markets. Security experts have argued in favor of operating system (OS) platform switching (ex., from Windows to Unix-based OSs) or secure OS adoption as being one of the techniques that can potentially mitigate the p"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1202.0885","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T04:03:05Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"g4zSTBBC37FLV5qNVQ3aitmZuzQjGB+T0Tde3Ri80EwXdiZnxMwnhO/ebGkel9Jpix8X5jLpRtbWHWwmd3vbBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T17:25:27.114430Z"},"content_sha256":"b7044fdacef7e5703b9033f193174986fa36f6330e08dadc8148aefb5a6df6e6","schema_version":"1.0","event_id":"sha256:b7044fdacef7e5703b9033f193174986fa36f6330e08dadc8148aefb5a6df6e6"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/5YHMHO3EM6GHMRC5L7BCM34LHC/bundle.json","state_url":"https://pith.science/pith/5YHMHO3EM6GHMRC5L7BCM34LHC/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/5YHMHO3EM6GHMRC5L7BCM34LHC/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T17:25:27Z","links":{"resolver":"https://pith.science/pith/5YHMHO3EM6GHMRC5L7BCM34LHC","bundle":"https://pith.science/pith/5YHMHO3EM6GHMRC5L7BCM34LHC/bundle.json","state":"https://pith.science/pith/5YHMHO3EM6GHMRC5L7BCM34LHC/state.json","well_known_bundle":"https://pith.science/.well-known/pith/5YHMHO3EM6GHMRC5L7BCM34LHC/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2012:5YHMHO3EM6GHMRC5L7BCM34LHC","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"751ffb8d0f1591f9a4a82160c44ba22d2c5a1f4a61ad02d3a03aff07beff8bc0","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2012-02-04T09:51:44Z","title_canon_sha256":"b0391a604e08992f1287a4626c777d4e4228d366000304bd2ed27ffc803efeca"},"schema_version":"1.0","source":{"id":"1202.0885","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1202.0885","created_at":"2026-05-18T04:03:05Z"},{"alias_kind":"arxiv_version","alias_value":"1202.0885v1","created_at":"2026-05-18T04:03:05Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1202.0885","created_at":"2026-05-18T04:03:05Z"},{"alias_kind":"pith_short_12","alias_value":"5YHMHO3EM6GH","created_at":"2026-05-18T12:26:56Z"},{"alias_kind":"pith_short_16","alias_value":"5YHMHO3EM6GHMRC5","created_at":"2026-05-18T12:26:56Z"},{"alias_kind":"pith_short_8","alias_value":"5YHMHO3E","created_at":"2026-05-18T12:26:56Z"}],"graph_snapshots":[{"event_id":"sha256:b7044fdacef7e5703b9033f193174986fa36f6330e08dadc8148aefb5a6df6e6","target":"graph","created_at":"2026-05-18T04:03:05Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In recent years, researchers have proposed \\emph{cyber-insurance} as a suitable risk-management technique for enhancing security in Internet-like distributed systems. However, amongst other factors, information asymmetry between the insurer and the insured, and the inter-dependent and correlated nature of cyber risks have contributed in a big way to the failure of cyber-insurance markets. Security experts have argued in favor of operating system (OS) platform switching (ex., from Windows to Unix-based OSs) or secure OS adoption as being one of the techniques that can potentially mitigate the p","authors_text":"Pan Hui, Ranjan Pal","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2012-02-04T09:51:44Z","title":"The Impact of Secure OSs on Internet Security: What Cyber-Insurers Need to Know"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1202.0885","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:40b95978b266fd2d3ec0b6a2454b8dfd9a2cacadd8b4fe5687f0ef635077e052","target":"record","created_at":"2026-05-18T04:03:05Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"751ffb8d0f1591f9a4a82160c44ba22d2c5a1f4a61ad02d3a03aff07beff8bc0","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2012-02-04T09:51:44Z","title_canon_sha256":"b0391a604e08992f1287a4626c777d4e4228d366000304bd2ed27ffc803efeca"},"schema_version":"1.0","source":{"id":"1202.0885","kind":"arxiv","version":1}},"canonical_sha256":"ee0ec3bb64678c76445d5fc2266f8b3880459c029ec8e9ec198e918f94666e33","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"ee0ec3bb64678c76445d5fc2266f8b3880459c029ec8e9ec198e918f94666e33","first_computed_at":"2026-05-18T04:03:05.894844Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T04:03:05.894844Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"hJS1kSVMNztKlaLydLz53SrnD5KcwTXwKmUhUF5rngR21/jkb/gCAiMmlu1VKO4EmZS5tb4Y2CHGZpGbaWSXDA==","signature_status":"signed_v1","signed_at":"2026-05-18T04:03:05.895534Z","signed_message":"canonical_sha256_bytes"},"source_id":"1202.0885","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:40b95978b266fd2d3ec0b6a2454b8dfd9a2cacadd8b4fe5687f0ef635077e052","sha256:b7044fdacef7e5703b9033f193174986fa36f6330e08dadc8148aefb5a6df6e6"],"state_sha256":"747377730f66183fa61c1ca2ee5fa257171ad8abbc4aea4576849cb34d1b4e95"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"HYGjLwSKRRTw6Xc607qQeiWDXQMSXd9gz7saUoALafCCovi2yH5LGwUbAvmznqygB/3NaAOv6P/MsNl3CdMODg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T17:25:27.117912Z","bundle_sha256":"bda5f8e1559ffea3317b72fb12256d0b2fb04f05edcef4f603e7f1a82f932cc2"}}