{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2012:C4C7QISWTAZHCSJHNRSYVPXBVU","short_pith_number":"pith:C4C7QISW","canonical_record":{"source":{"id":"1211.2287","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2012-11-10T03:36:00Z","cross_cats_sorted":["cs.NI"],"title_canon_sha256":"d69324a3ab7636d75b6c8184dc46183c3293578f32d03e103b2b50ae8569ae8c","abstract_canon_sha256":"3a67e78d26d09874e1704548a7fe317936c604250e4ccd5da3be66d37d462bd2"},"schema_version":"1.0"},"canonical_sha256":"1705f8225698327149276c658abee1ad083299746bf1dd35cb4b19965b6bd3d7","source":{"kind":"arxiv","id":"1211.2287","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1211.2287","created_at":"2026-05-18T03:41:03Z"},{"alias_kind":"arxiv_version","alias_value":"1211.2287v1","created_at":"2026-05-18T03:41:03Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1211.2287","created_at":"2026-05-18T03:41:03Z"},{"alias_kind":"pith_short_12","alias_value":"C4C7QISWTAZH","created_at":"2026-05-18T12:27:01Z"},{"alias_kind":"pith_short_16","alias_value":"C4C7QISWTAZHCSJH","created_at":"2026-05-18T12:27:01Z"},{"alias_kind":"pith_short_8","alias_value":"C4C7QISW","created_at":"2026-05-18T12:27:01Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2012:C4C7QISWTAZHCSJHNRSYVPXBVU","target":"record","payload":{"canonical_record":{"source":{"id":"1211.2287","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2012-11-10T03:36:00Z","cross_cats_sorted":["cs.NI"],"title_canon_sha256":"d69324a3ab7636d75b6c8184dc46183c3293578f32d03e103b2b50ae8569ae8c","abstract_canon_sha256":"3a67e78d26d09874e1704548a7fe317936c604250e4ccd5da3be66d37d462bd2"},"schema_version":"1.0"},"canonical_sha256":"1705f8225698327149276c658abee1ad083299746bf1dd35cb4b19965b6bd3d7","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:41:03.883453Z","signature_b64":"KpJjHKN4Mu9NsScPfuOZpYxF2kyIbJaXTyWDB1U1mrLoiuE9OD1KCQvuaWeZDzr/BkO6S1TST1fz9hAwRYT5CA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"1705f8225698327149276c658abee1ad083299746bf1dd35cb4b19965b6bd3d7","last_reissued_at":"2026-05-18T03:41:03.882781Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:41:03.882781Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1211.2287","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:41:03Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Vif9WXB6ckA7sBq+kzDQnw7fnJ0LYt6dyEJ8oLQrMsq7up9VHvOJsgXWOxgVu/RVy83V9NdavV42MP0txvDOAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T13:02:33.007473Z"},"content_sha256":"6b6c0ba2da5b0ef3f303071144992c0556c5deee8cabf94af963450d3722ba66","schema_version":"1.0","event_id":"sha256:6b6c0ba2da5b0ef3f303071144992c0556c5deee8cabf94af963450d3722ba66"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2012:C4C7QISWTAZHCSJHNRSYVPXBVU","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Designing Rating Systems to Promote Mutual Security for Interconnected Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.NI"],"primary_cat":"cs.GT","authors_text":"Jie Xu, Mihaela van der Schaar, Yu Zhang","submitted_at":"2012-11-10T03:36:00Z","abstract_excerpt":"Interconnected autonomous systems often share security risks. However, an autonomous system lacks the incentive to make (sufficient) security investments if the cost exceeds its own benefit even though doing that would be socially beneficial. In this paper, we develop a systematic and rigorous framework for analyzing and significantly improving the mutual security of a collection of ASs that interact frequently over a long period of time. Using this framework, we show that simple incentive schemes based on rating systems can be designed to encourage the autonomous systems' security investments"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1211.2287","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:41:03Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"1eKYMvz8a5bWstFRU6OpJRJdXTjTCOsbHjq0VmYTQxX6s//JdlR6UjQ17APWqIeXZcnO/xSRFTARbU8T9iOQDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T13:02:33.008036Z"},"content_sha256":"25a576e7617f25d821c0450a04bbe45539359718b11506927346e5e09b58931b","schema_version":"1.0","event_id":"sha256:25a576e7617f25d821c0450a04bbe45539359718b11506927346e5e09b58931b"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/C4C7QISWTAZHCSJHNRSYVPXBVU/bundle.json","state_url":"https://pith.science/pith/C4C7QISWTAZHCSJHNRSYVPXBVU/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/C4C7QISWTAZHCSJHNRSYVPXBVU/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T13:02:33Z","links":{"resolver":"https://pith.science/pith/C4C7QISWTAZHCSJHNRSYVPXBVU","bundle":"https://pith.science/pith/C4C7QISWTAZHCSJHNRSYVPXBVU/bundle.json","state":"https://pith.science/pith/C4C7QISWTAZHCSJHNRSYVPXBVU/state.json","well_known_bundle":"https://pith.science/.well-known/pith/C4C7QISWTAZHCSJHNRSYVPXBVU/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2012:C4C7QISWTAZHCSJHNRSYVPXBVU","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"3a67e78d26d09874e1704548a7fe317936c604250e4ccd5da3be66d37d462bd2","cross_cats_sorted":["cs.NI"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2012-11-10T03:36:00Z","title_canon_sha256":"d69324a3ab7636d75b6c8184dc46183c3293578f32d03e103b2b50ae8569ae8c"},"schema_version":"1.0","source":{"id":"1211.2287","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1211.2287","created_at":"2026-05-18T03:41:03Z"},{"alias_kind":"arxiv_version","alias_value":"1211.2287v1","created_at":"2026-05-18T03:41:03Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1211.2287","created_at":"2026-05-18T03:41:03Z"},{"alias_kind":"pith_short_12","alias_value":"C4C7QISWTAZH","created_at":"2026-05-18T12:27:01Z"},{"alias_kind":"pith_short_16","alias_value":"C4C7QISWTAZHCSJH","created_at":"2026-05-18T12:27:01Z"},{"alias_kind":"pith_short_8","alias_value":"C4C7QISW","created_at":"2026-05-18T12:27:01Z"}],"graph_snapshots":[{"event_id":"sha256:25a576e7617f25d821c0450a04bbe45539359718b11506927346e5e09b58931b","target":"graph","created_at":"2026-05-18T03:41:03Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Interconnected autonomous systems often share security risks. However, an autonomous system lacks the incentive to make (sufficient) security investments if the cost exceeds its own benefit even though doing that would be socially beneficial. In this paper, we develop a systematic and rigorous framework for analyzing and significantly improving the mutual security of a collection of ASs that interact frequently over a long period of time. Using this framework, we show that simple incentive schemes based on rating systems can be designed to encourage the autonomous systems' security investments","authors_text":"Jie Xu, Mihaela van der Schaar, Yu Zhang","cross_cats":["cs.NI"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2012-11-10T03:36:00Z","title":"Designing Rating Systems to Promote Mutual Security for Interconnected Networks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1211.2287","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:6b6c0ba2da5b0ef3f303071144992c0556c5deee8cabf94af963450d3722ba66","target":"record","created_at":"2026-05-18T03:41:03Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"3a67e78d26d09874e1704548a7fe317936c604250e4ccd5da3be66d37d462bd2","cross_cats_sorted":["cs.NI"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.GT","submitted_at":"2012-11-10T03:36:00Z","title_canon_sha256":"d69324a3ab7636d75b6c8184dc46183c3293578f32d03e103b2b50ae8569ae8c"},"schema_version":"1.0","source":{"id":"1211.2287","kind":"arxiv","version":1}},"canonical_sha256":"1705f8225698327149276c658abee1ad083299746bf1dd35cb4b19965b6bd3d7","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"1705f8225698327149276c658abee1ad083299746bf1dd35cb4b19965b6bd3d7","first_computed_at":"2026-05-18T03:41:03.882781Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:41:03.882781Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"KpJjHKN4Mu9NsScPfuOZpYxF2kyIbJaXTyWDB1U1mrLoiuE9OD1KCQvuaWeZDzr/BkO6S1TST1fz9hAwRYT5CA==","signature_status":"signed_v1","signed_at":"2026-05-18T03:41:03.883453Z","signed_message":"canonical_sha256_bytes"},"source_id":"1211.2287","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:6b6c0ba2da5b0ef3f303071144992c0556c5deee8cabf94af963450d3722ba66","sha256:25a576e7617f25d821c0450a04bbe45539359718b11506927346e5e09b58931b"],"state_sha256":"8ee5dcdfddf3d9b866681a96dd3170df18bee433d328b3ab979398a9136084d2"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"3lnIr2ao+ASFd9LjkbFmJOWbdvNE2OkDB9/Vr+FP4j0pLmLNwk3LVK2DwUp+Iky8ebz0FQu5I6If/abKsebLCQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T13:02:33.010927Z","bundle_sha256":"4d03a3c88a411e983a1126e015a0ad05ea3aba07bdf1fad587608d51cdfec8e3"}}