{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2007:76MLJYG6TKTZ2ST4BH6UXYI3ZL","short_pith_number":"pith:76MLJYG6","canonical_record":{"source":{"id":"0712.1205","kind":"arxiv","version":2},"metadata":{"license":"","primary_cat":"cs.PL","submitted_at":"2007-12-07T18:58:35Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"f3a77bd1c9b240a9e078f1700e5a4df02f87e0557416030c4bb33d92a39a3316","abstract_canon_sha256":"ffaf99e75233e73fde41af5556018e8413248e40622212252ed157f75c864042"},"schema_version":"1.0"},"canonical_sha256":"ff98b4e0de9aa79d4a7c09fd4be11bcad9fc9f3f2fab30386b7c5bd35fd896c4","source":{"kind":"arxiv","id":"0712.1205","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"0712.1205","created_at":"2026-05-18T01:37:42Z"},{"alias_kind":"arxiv_version","alias_value":"0712.1205v2","created_at":"2026-05-18T01:37:42Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.0712.1205","created_at":"2026-05-18T01:37:42Z"},{"alias_kind":"pith_short_12","alias_value":"76MLJYG6TKTZ","created_at":"2026-05-18T12:25:55Z"},{"alias_kind":"pith_short_16","alias_value":"76MLJYG6TKTZ2ST4","created_at":"2026-05-18T12:25:55Z"},{"alias_kind":"pith_short_8","alias_value":"76MLJYG6","created_at":"2026-05-18T12:25:55Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2007:76MLJYG6TKTZ2ST4BH6UXYI3ZL","target":"record","payload":{"canonical_record":{"source":{"id":"0712.1205","kind":"arxiv","version":2},"metadata":{"license":"","primary_cat":"cs.PL","submitted_at":"2007-12-07T18:58:35Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"f3a77bd1c9b240a9e078f1700e5a4df02f87e0557416030c4bb33d92a39a3316","abstract_canon_sha256":"ffaf99e75233e73fde41af5556018e8413248e40622212252ed157f75c864042"},"schema_version":"1.0"},"canonical_sha256":"ff98b4e0de9aa79d4a7c09fd4be11bcad9fc9f3f2fab30386b7c5bd35fd896c4","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:37:42.583412Z","signature_b64":"+p2auxv1lwXQMBh6+CS9G6y0DWiDJ5ox38IrNkKT4fu29oFAw40FIG610AgnI6I71rwSt8uW+vkruSkLdx0GCQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"ff98b4e0de9aa79d4a7c09fd4be11bcad9fc9f3f2fab30386b7c5bd35fd896c4","last_reissued_at":"2026-05-18T01:37:42.582653Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:37:42.582653Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"0712.1205","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:37:42Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"DJTsTFomUOJh4vywE5DuxEOkqo/IM7QcLgutgtHwq7tu6nL7bGHOnCTZL3/bUR+qDtZX6NzdNTiWvlgQvbi/BA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T12:40:44.717504Z"},"content_sha256":"2b25358fd79c111f957dd9196eda177f46f9ae741decc14ed02f7d2bf021c92b","schema_version":"1.0","event_id":"sha256:2b25358fd79c111f957dd9196eda177f46f9ae741decc14ed02f7d2bf021c92b"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2007:76MLJYG6TKTZ2ST4BH6UXYI3ZL","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Lambda-RBAC: Programming with Role-Based Access Control","license":"","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.PL","authors_text":"Alan Jeffrey, Corin Pitcher, James Riely, Radha Jagadeesan","submitted_at":"2007-12-07T18:58:35Z","abstract_excerpt":"We study mechanisms that permit program components to express role constraints on clients, focusing on programmatic security mechanisms, which permit access controls to be expressed, in situ, as part of the code realizing basic functionality. In this setting, two questions immediately arise: (1) The user of a component faces the issue of safety: is a particular role sufficient to use the component? (2) The component designer faces the dual issue of protection: is a particular role demanded in all execution paths of the component? We provide a formal calculus and static analysis to answer both "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"0712.1205","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:37:42Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"KmcM9zNXz4ntv/AJOvPlDnPXvI6vZOm91dBwjo+F49bOKpgBWQJvKrJpRIAvTenIVt+q+Inc4xZYSX2/BlSZDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T12:40:44.717860Z"},"content_sha256":"22542e24e8daa097cb5ae57a4d2d61389b2f02abf7dd743d51c4525b5dd71bb8","schema_version":"1.0","event_id":"sha256:22542e24e8daa097cb5ae57a4d2d61389b2f02abf7dd743d51c4525b5dd71bb8"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/76MLJYG6TKTZ2ST4BH6UXYI3ZL/bundle.json","state_url":"https://pith.science/pith/76MLJYG6TKTZ2ST4BH6UXYI3ZL/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/76MLJYG6TKTZ2ST4BH6UXYI3ZL/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T12:40:44Z","links":{"resolver":"https://pith.science/pith/76MLJYG6TKTZ2ST4BH6UXYI3ZL","bundle":"https://pith.science/pith/76MLJYG6TKTZ2ST4BH6UXYI3ZL/bundle.json","state":"https://pith.science/pith/76MLJYG6TKTZ2ST4BH6UXYI3ZL/state.json","well_known_bundle":"https://pith.science/.well-known/pith/76MLJYG6TKTZ2ST4BH6UXYI3ZL/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2007:76MLJYG6TKTZ2ST4BH6UXYI3ZL","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"ffaf99e75233e73fde41af5556018e8413248e40622212252ed157f75c864042","cross_cats_sorted":["cs.CR"],"license":"","primary_cat":"cs.PL","submitted_at":"2007-12-07T18:58:35Z","title_canon_sha256":"f3a77bd1c9b240a9e078f1700e5a4df02f87e0557416030c4bb33d92a39a3316"},"schema_version":"1.0","source":{"id":"0712.1205","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"0712.1205","created_at":"2026-05-18T01:37:42Z"},{"alias_kind":"arxiv_version","alias_value":"0712.1205v2","created_at":"2026-05-18T01:37:42Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.0712.1205","created_at":"2026-05-18T01:37:42Z"},{"alias_kind":"pith_short_12","alias_value":"76MLJYG6TKTZ","created_at":"2026-05-18T12:25:55Z"},{"alias_kind":"pith_short_16","alias_value":"76MLJYG6TKTZ2ST4","created_at":"2026-05-18T12:25:55Z"},{"alias_kind":"pith_short_8","alias_value":"76MLJYG6","created_at":"2026-05-18T12:25:55Z"}],"graph_snapshots":[{"event_id":"sha256:22542e24e8daa097cb5ae57a4d2d61389b2f02abf7dd743d51c4525b5dd71bb8","target":"graph","created_at":"2026-05-18T01:37:42Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We study mechanisms that permit program components to express role constraints on clients, focusing on programmatic security mechanisms, which permit access controls to be expressed, in situ, as part of the code realizing basic functionality. In this setting, two questions immediately arise: (1) The user of a component faces the issue of safety: is a particular role sufficient to use the component? (2) The component designer faces the dual issue of protection: is a particular role demanded in all execution paths of the component? We provide a formal calculus and static analysis to answer both ","authors_text":"Alan Jeffrey, Corin Pitcher, James Riely, Radha Jagadeesan","cross_cats":["cs.CR"],"headline":"","license":"","primary_cat":"cs.PL","submitted_at":"2007-12-07T18:58:35Z","title":"Lambda-RBAC: Programming with Role-Based Access Control"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"0712.1205","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:2b25358fd79c111f957dd9196eda177f46f9ae741decc14ed02f7d2bf021c92b","target":"record","created_at":"2026-05-18T01:37:42Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"ffaf99e75233e73fde41af5556018e8413248e40622212252ed157f75c864042","cross_cats_sorted":["cs.CR"],"license":"","primary_cat":"cs.PL","submitted_at":"2007-12-07T18:58:35Z","title_canon_sha256":"f3a77bd1c9b240a9e078f1700e5a4df02f87e0557416030c4bb33d92a39a3316"},"schema_version":"1.0","source":{"id":"0712.1205","kind":"arxiv","version":2}},"canonical_sha256":"ff98b4e0de9aa79d4a7c09fd4be11bcad9fc9f3f2fab30386b7c5bd35fd896c4","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"ff98b4e0de9aa79d4a7c09fd4be11bcad9fc9f3f2fab30386b7c5bd35fd896c4","first_computed_at":"2026-05-18T01:37:42.582653Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:37:42.582653Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"+p2auxv1lwXQMBh6+CS9G6y0DWiDJ5ox38IrNkKT4fu29oFAw40FIG610AgnI6I71rwSt8uW+vkruSkLdx0GCQ==","signature_status":"signed_v1","signed_at":"2026-05-18T01:37:42.583412Z","signed_message":"canonical_sha256_bytes"},"source_id":"0712.1205","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:2b25358fd79c111f957dd9196eda177f46f9ae741decc14ed02f7d2bf021c92b","sha256:22542e24e8daa097cb5ae57a4d2d61389b2f02abf7dd743d51c4525b5dd71bb8"],"state_sha256":"a4e725e2543ca022d61e9e0d2b5332304a732f8c8619ab64be2c16bb1b7b5688"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"58OX0uDuZG/plCJPWEteTmkHWMutifnG6RwEo2gCOPjoOJGFt/qfjATRTaPgLV6A+sR1P3F/mg4YHmUNr8miDQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T12:40:44.720252Z","bundle_sha256":"8f967afa6ef81033c227a4f740b6b1f2557a8c842b2349b8f1cf04724578464a"}}