{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:IOQYDSQS5P2NHSFA23ZJB3HJ7X","short_pith_number":"pith:IOQYDSQS","canonical_record":{"source":{"id":"1806.02053","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-06-06T08:19:52Z","cross_cats_sorted":[],"title_canon_sha256":"801cc6fd7cb2133fe944374afff9950c6e4aac3d040801b7886787d39e411838","abstract_canon_sha256":"5aca1f9ff3d862ef1283717bdb81d69c7608e4f56a4026e3b112c58e43f274dc"},"schema_version":"1.0"},"canonical_sha256":"43a181ca12ebf4d3c8a0d6f290ece9fded80664570117c44f3c597678ded4b84","source":{"kind":"arxiv","id":"1806.02053","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1806.02053","created_at":"2026-05-18T00:14:02Z"},{"alias_kind":"arxiv_version","alias_value":"1806.02053v1","created_at":"2026-05-18T00:14:02Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1806.02053","created_at":"2026-05-18T00:14:02Z"},{"alias_kind":"pith_short_12","alias_value":"IOQYDSQS5P2N","created_at":"2026-05-18T12:32:31Z"},{"alias_kind":"pith_short_16","alias_value":"IOQYDSQS5P2NHSFA","created_at":"2026-05-18T12:32:31Z"},{"alias_kind":"pith_short_8","alias_value":"IOQYDSQS","created_at":"2026-05-18T12:32:31Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:IOQYDSQS5P2NHSFA23ZJB3HJ7X","target":"record","payload":{"canonical_record":{"source":{"id":"1806.02053","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-06-06T08:19:52Z","cross_cats_sorted":[],"title_canon_sha256":"801cc6fd7cb2133fe944374afff9950c6e4aac3d040801b7886787d39e411838","abstract_canon_sha256":"5aca1f9ff3d862ef1283717bdb81d69c7608e4f56a4026e3b112c58e43f274dc"},"schema_version":"1.0"},"canonical_sha256":"43a181ca12ebf4d3c8a0d6f290ece9fded80664570117c44f3c597678ded4b84","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:14:02.870903Z","signature_b64":"h8/0Y+UE7aWS5ZXh8/S0FKEHzQM+a6EIkGx9G8ppm4w3hvILzMrQhSM+ub1jzRJR17BcIJF/Udi8GT97ZPrCDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"43a181ca12ebf4d3c8a0d6f290ece9fded80664570117c44f3c597678ded4b84","last_reissued_at":"2026-05-18T00:14:02.870241Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:14:02.870241Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1806.02053","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:14:02Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"bFRrvj8CEMnBI+i/DpmYV7ywZVIxGval2RQ4rZ1+JH7todP3OasqNEYFqMR/oI1p3TVQnMMvwy3iO33V/Db8DA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T20:29:01.796621Z"},"content_sha256":"dc6732a04493cba675bd20c196f96f8a97d3b964a937da4878e32309fd9b92a5","schema_version":"1.0","event_id":"sha256:dc6732a04493cba675bd20c196f96f8a97d3b964a937da4878e32309fd9b92a5"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:IOQYDSQS5P2NHSFA23ZJB3HJ7X","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"A Policy based Security Architecture for Software Defined Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Kallol Karmakar, Michael Hitchens, Uday Tupakula, Vijay Varadharajan","submitted_at":"2018-06-06T08:19:52Z","abstract_excerpt":"As networks expand in size and complexity, they pose greater administrative and management challenges. Software Defined Networks (SDN) offer a promising approach to meeting some of these challenges. In this paper, we propose a policy driven security architecture for securing end to end services across multiple SDN domains. We develop a language based approach to design security policies that are relevant for securing SDN services and communications. We describe the policy language and its use in specifying security policies to control the flow of information in a multi-domain SDN. We demonstra"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1806.02053","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:14:02Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"rpe/wMBRPjo+fcAfmZYYRe9ePVQjJ67E+PZqAji64mU3IGrKRMHhGXo7OMXCj0rRYK0ZpCcswsNuq1odIR3NDA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T20:29:01.796967Z"},"content_sha256":"dce83779fb5f7ea8857d20f792aeab5829c20ffdbb60975ad76c7b8cf044213e","schema_version":"1.0","event_id":"sha256:dce83779fb5f7ea8857d20f792aeab5829c20ffdbb60975ad76c7b8cf044213e"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/IOQYDSQS5P2NHSFA23ZJB3HJ7X/bundle.json","state_url":"https://pith.science/pith/IOQYDSQS5P2NHSFA23ZJB3HJ7X/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/IOQYDSQS5P2NHSFA23ZJB3HJ7X/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T20:29:01Z","links":{"resolver":"https://pith.science/pith/IOQYDSQS5P2NHSFA23ZJB3HJ7X","bundle":"https://pith.science/pith/IOQYDSQS5P2NHSFA23ZJB3HJ7X/bundle.json","state":"https://pith.science/pith/IOQYDSQS5P2NHSFA23ZJB3HJ7X/state.json","well_known_bundle":"https://pith.science/.well-known/pith/IOQYDSQS5P2NHSFA23ZJB3HJ7X/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:IOQYDSQS5P2NHSFA23ZJB3HJ7X","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"5aca1f9ff3d862ef1283717bdb81d69c7608e4f56a4026e3b112c58e43f274dc","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-06-06T08:19:52Z","title_canon_sha256":"801cc6fd7cb2133fe944374afff9950c6e4aac3d040801b7886787d39e411838"},"schema_version":"1.0","source":{"id":"1806.02053","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1806.02053","created_at":"2026-05-18T00:14:02Z"},{"alias_kind":"arxiv_version","alias_value":"1806.02053v1","created_at":"2026-05-18T00:14:02Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1806.02053","created_at":"2026-05-18T00:14:02Z"},{"alias_kind":"pith_short_12","alias_value":"IOQYDSQS5P2N","created_at":"2026-05-18T12:32:31Z"},{"alias_kind":"pith_short_16","alias_value":"IOQYDSQS5P2NHSFA","created_at":"2026-05-18T12:32:31Z"},{"alias_kind":"pith_short_8","alias_value":"IOQYDSQS","created_at":"2026-05-18T12:32:31Z"}],"graph_snapshots":[{"event_id":"sha256:dce83779fb5f7ea8857d20f792aeab5829c20ffdbb60975ad76c7b8cf044213e","target":"graph","created_at":"2026-05-18T00:14:02Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"As networks expand in size and complexity, they pose greater administrative and management challenges. Software Defined Networks (SDN) offer a promising approach to meeting some of these challenges. In this paper, we propose a policy driven security architecture for securing end to end services across multiple SDN domains. We develop a language based approach to design security policies that are relevant for securing SDN services and communications. We describe the policy language and its use in specifying security policies to control the flow of information in a multi-domain SDN. We demonstra","authors_text":"Kallol Karmakar, Michael Hitchens, Uday Tupakula, Vijay Varadharajan","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-06-06T08:19:52Z","title":"A Policy based Security Architecture for Software Defined Networks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1806.02053","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:dc6732a04493cba675bd20c196f96f8a97d3b964a937da4878e32309fd9b92a5","target":"record","created_at":"2026-05-18T00:14:02Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"5aca1f9ff3d862ef1283717bdb81d69c7608e4f56a4026e3b112c58e43f274dc","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-06-06T08:19:52Z","title_canon_sha256":"801cc6fd7cb2133fe944374afff9950c6e4aac3d040801b7886787d39e411838"},"schema_version":"1.0","source":{"id":"1806.02053","kind":"arxiv","version":1}},"canonical_sha256":"43a181ca12ebf4d3c8a0d6f290ece9fded80664570117c44f3c597678ded4b84","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"43a181ca12ebf4d3c8a0d6f290ece9fded80664570117c44f3c597678ded4b84","first_computed_at":"2026-05-18T00:14:02.870241Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:14:02.870241Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"h8/0Y+UE7aWS5ZXh8/S0FKEHzQM+a6EIkGx9G8ppm4w3hvILzMrQhSM+ub1jzRJR17BcIJF/Udi8GT97ZPrCDg==","signature_status":"signed_v1","signed_at":"2026-05-18T00:14:02.870903Z","signed_message":"canonical_sha256_bytes"},"source_id":"1806.02053","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:dc6732a04493cba675bd20c196f96f8a97d3b964a937da4878e32309fd9b92a5","sha256:dce83779fb5f7ea8857d20f792aeab5829c20ffdbb60975ad76c7b8cf044213e"],"state_sha256":"6a9b779efa257cce0761716ef26a441ed3590c3d46b0ee805446bfb1c4f30438"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"0356aj9WhqIVhAM9CGtFzShDrjeRfKPGL3Ztq7zk9xDHhl71XzhlSq+Cm7YqH3CPzzgPw3+n318oKaGUyQUvAA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T20:29:01.798918Z","bundle_sha256":"9b4957790da99bf0565302daef4afe8abb1e443bb6933982e76ad532b29d4b67"}}