{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:HTQV7AKPNCAEG5ZMXGXHVG2A3V","short_pith_number":"pith:HTQV7AKP","canonical_record":{"source":{"id":"1607.02982","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2016-07-11T14:44:01Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"057645440b57ff9ce08729e507d2c3e948ac9e716f7d617b86f7cabd435d49d2","abstract_canon_sha256":"7e1af769e13acc2e15cc140e625be35fe9db597fd72ac8b922c3f295d691e8b2"},"schema_version":"1.0"},"canonical_sha256":"3ce15f814f688043772cb9ae7a9b40dd43e255b8a5bb3c952ff80f2ae5b54702","source":{"kind":"arxiv","id":"1607.02982","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1607.02982","created_at":"2026-05-18T00:55:21Z"},{"alias_kind":"arxiv_version","alias_value":"1607.02982v1","created_at":"2026-05-18T00:55:21Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1607.02982","created_at":"2026-05-18T00:55:21Z"},{"alias_kind":"pith_short_12","alias_value":"HTQV7AKPNCAE","created_at":"2026-05-18T12:30:22Z"},{"alias_kind":"pith_short_16","alias_value":"HTQV7AKPNCAEG5ZM","created_at":"2026-05-18T12:30:22Z"},{"alias_kind":"pith_short_8","alias_value":"HTQV7AKP","created_at":"2026-05-18T12:30:22Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:HTQV7AKPNCAEG5ZMXGXHVG2A3V","target":"record","payload":{"canonical_record":{"source":{"id":"1607.02982","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2016-07-11T14:44:01Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"057645440b57ff9ce08729e507d2c3e948ac9e716f7d617b86f7cabd435d49d2","abstract_canon_sha256":"7e1af769e13acc2e15cc140e625be35fe9db597fd72ac8b922c3f295d691e8b2"},"schema_version":"1.0"},"canonical_sha256":"3ce15f814f688043772cb9ae7a9b40dd43e255b8a5bb3c952ff80f2ae5b54702","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:55:21.015627Z","signature_b64":"yiDX6EDd7GLwUv/F2ZpkrHXcnymF5TjLG2kD02YIDbVwqhWj5CM8Vng9aqVc1nC1D5g6LWX/lhHumiZO0umMDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"3ce15f814f688043772cb9ae7a9b40dd43e255b8a5bb3c952ff80f2ae5b54702","last_reissued_at":"2026-05-18T00:55:21.014970Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:55:21.014970Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1607.02982","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:55:21Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"rW+Y7G74PreBE1dZpmArit9NuoycjXNRBqQweDybKhn+VeOXORB1tWkmRYw54xgENymWcOTLbCY2H+EyHTxwDA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T13:04:36.111596Z"},"content_sha256":"a246309c88519796cf6b6dae1a108ec14eaa2fa01e0d509925be06fe6f3b173c","schema_version":"1.0","event_id":"sha256:a246309c88519796cf6b6dae1a108ec14eaa2fa01e0d509925be06fe6f3b173c"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:HTQV7AKPNCAEG5ZMXGXHVG2A3V","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Enhancing HPC Security with a User-Based Firewall","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.DC","authors_text":"Albert Reuther, Andrew Prout, Antonio Rosa, Bill Bergeron, Chansup Byun, David Bestor, Jeremy Kepner, Julie Mullen, Lauren Milechin, Matthew Hubbell, Michael Houle, Michael Jones, Peter Michaleas, Siddharth Samsi, Vijay Gadepally, William Arcand","submitted_at":"2016-07-11T14:44:01Z","abstract_excerpt":"HPC systems traditionally allow their users unrestricted use of their internal network. While this network is normally controlled enough to guarantee privacy without the need for encryption, it does not provide a method to authenticate peer connections. Protocols built upon this internal network must provide their own authentication. Many methods have been employed to perform this authentication. However, support for all of these methods requires the HPC application developer to include support and the user to configure and enable these services. The user-based firewall capability we have prot"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1607.02982","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:55:21Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"o5aYNVcOFRdsrvpCIkTpgXGZizIuwcK8nt6pPNoMpSGMix1iVow2f9n6cPaYjeTH+5H+WTAOQZm1qAanIJDNAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T13:04:36.112269Z"},"content_sha256":"ff1e49178bffc694b3a3792574f198ba304bbbc28f64a25f76388f174259742a","schema_version":"1.0","event_id":"sha256:ff1e49178bffc694b3a3792574f198ba304bbbc28f64a25f76388f174259742a"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/HTQV7AKPNCAEG5ZMXGXHVG2A3V/bundle.json","state_url":"https://pith.science/pith/HTQV7AKPNCAEG5ZMXGXHVG2A3V/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/HTQV7AKPNCAEG5ZMXGXHVG2A3V/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T13:04:36Z","links":{"resolver":"https://pith.science/pith/HTQV7AKPNCAEG5ZMXGXHVG2A3V","bundle":"https://pith.science/pith/HTQV7AKPNCAEG5ZMXGXHVG2A3V/bundle.json","state":"https://pith.science/pith/HTQV7AKPNCAEG5ZMXGXHVG2A3V/state.json","well_known_bundle":"https://pith.science/.well-known/pith/HTQV7AKPNCAEG5ZMXGXHVG2A3V/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:HTQV7AKPNCAEG5ZMXGXHVG2A3V","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"7e1af769e13acc2e15cc140e625be35fe9db597fd72ac8b922c3f295d691e8b2","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2016-07-11T14:44:01Z","title_canon_sha256":"057645440b57ff9ce08729e507d2c3e948ac9e716f7d617b86f7cabd435d49d2"},"schema_version":"1.0","source":{"id":"1607.02982","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1607.02982","created_at":"2026-05-18T00:55:21Z"},{"alias_kind":"arxiv_version","alias_value":"1607.02982v1","created_at":"2026-05-18T00:55:21Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1607.02982","created_at":"2026-05-18T00:55:21Z"},{"alias_kind":"pith_short_12","alias_value":"HTQV7AKPNCAE","created_at":"2026-05-18T12:30:22Z"},{"alias_kind":"pith_short_16","alias_value":"HTQV7AKPNCAEG5ZM","created_at":"2026-05-18T12:30:22Z"},{"alias_kind":"pith_short_8","alias_value":"HTQV7AKP","created_at":"2026-05-18T12:30:22Z"}],"graph_snapshots":[{"event_id":"sha256:ff1e49178bffc694b3a3792574f198ba304bbbc28f64a25f76388f174259742a","target":"graph","created_at":"2026-05-18T00:55:21Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"HPC systems traditionally allow their users unrestricted use of their internal network. While this network is normally controlled enough to guarantee privacy without the need for encryption, it does not provide a method to authenticate peer connections. Protocols built upon this internal network must provide their own authentication. Many methods have been employed to perform this authentication. However, support for all of these methods requires the HPC application developer to include support and the user to configure and enable these services. The user-based firewall capability we have prot","authors_text":"Albert Reuther, Andrew Prout, Antonio Rosa, Bill Bergeron, Chansup Byun, David Bestor, Jeremy Kepner, Julie Mullen, Lauren Milechin, Matthew Hubbell, Michael Houle, Michael Jones, Peter Michaleas, Siddharth Samsi, Vijay Gadepally, William Arcand","cross_cats":["cs.CR"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2016-07-11T14:44:01Z","title":"Enhancing HPC Security with a User-Based Firewall"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1607.02982","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:a246309c88519796cf6b6dae1a108ec14eaa2fa01e0d509925be06fe6f3b173c","target":"record","created_at":"2026-05-18T00:55:21Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"7e1af769e13acc2e15cc140e625be35fe9db597fd72ac8b922c3f295d691e8b2","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2016-07-11T14:44:01Z","title_canon_sha256":"057645440b57ff9ce08729e507d2c3e948ac9e716f7d617b86f7cabd435d49d2"},"schema_version":"1.0","source":{"id":"1607.02982","kind":"arxiv","version":1}},"canonical_sha256":"3ce15f814f688043772cb9ae7a9b40dd43e255b8a5bb3c952ff80f2ae5b54702","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"3ce15f814f688043772cb9ae7a9b40dd43e255b8a5bb3c952ff80f2ae5b54702","first_computed_at":"2026-05-18T00:55:21.014970Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:55:21.014970Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"yiDX6EDd7GLwUv/F2ZpkrHXcnymF5TjLG2kD02YIDbVwqhWj5CM8Vng9aqVc1nC1D5g6LWX/lhHumiZO0umMDg==","signature_status":"signed_v1","signed_at":"2026-05-18T00:55:21.015627Z","signed_message":"canonical_sha256_bytes"},"source_id":"1607.02982","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:a246309c88519796cf6b6dae1a108ec14eaa2fa01e0d509925be06fe6f3b173c","sha256:ff1e49178bffc694b3a3792574f198ba304bbbc28f64a25f76388f174259742a"],"state_sha256":"d44630df4c33b1395f70acd4c8bc6daa7549c9baedac6c500f7a71c03f3bf333"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"I40HuW4RwSg78U/1H7QcrT62YysV6omLb6BvdbxYXLX/iV/wwWDDXf2hhZKB7Ai6gHACOtYJ+anOFfz6cASGBA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T13:04:36.115796Z","bundle_sha256":"f8f0ff034e07205789965550a95dff358df2659953ef472353cbf6d9ca302dc2"}}