{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:MWZE4EOLDPIHN6IPZKACW54GHQ","short_pith_number":"pith:MWZE4EOL","canonical_record":{"source":{"id":"1603.03501","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","primary_cat":"cs.NI","submitted_at":"2016-03-11T01:33:15Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"68f99b1b01bde0b6f792e38e2c3d01cedfecb2ed9fdaeec68736718241f1eee5","abstract_canon_sha256":"ea3c1ec94df7460a95fdb462f58ee55da1bd490db9cd0c87df11b5346dc2ea8b"},"schema_version":"1.0"},"canonical_sha256":"65b24e11cb1bd076f90fca802b77863c24b977bea5f1cafa754e9c7008599f7a","source":{"kind":"arxiv","id":"1603.03501","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1603.03501","created_at":"2026-05-18T01:19:15Z"},{"alias_kind":"arxiv_version","alias_value":"1603.03501v1","created_at":"2026-05-18T01:19:15Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1603.03501","created_at":"2026-05-18T01:19:15Z"},{"alias_kind":"pith_short_12","alias_value":"MWZE4EOLDPIH","created_at":"2026-05-18T12:30:32Z"},{"alias_kind":"pith_short_16","alias_value":"MWZE4EOLDPIHN6IP","created_at":"2026-05-18T12:30:32Z"},{"alias_kind":"pith_short_8","alias_value":"MWZE4EOL","created_at":"2026-05-18T12:30:32Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:MWZE4EOLDPIHN6IPZKACW54GHQ","target":"record","payload":{"canonical_record":{"source":{"id":"1603.03501","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","primary_cat":"cs.NI","submitted_at":"2016-03-11T01:33:15Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"68f99b1b01bde0b6f792e38e2c3d01cedfecb2ed9fdaeec68736718241f1eee5","abstract_canon_sha256":"ea3c1ec94df7460a95fdb462f58ee55da1bd490db9cd0c87df11b5346dc2ea8b"},"schema_version":"1.0"},"canonical_sha256":"65b24e11cb1bd076f90fca802b77863c24b977bea5f1cafa754e9c7008599f7a","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:19:15.474711Z","signature_b64":"ECd6H+M8Df49UzUVYOLwFCoHYJNco7BWfMxSyKT3i1KTBx8i+1BdosvZd4uStCzlO9ETZypFDJ+W4MIrMYhnCA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"65b24e11cb1bd076f90fca802b77863c24b977bea5f1cafa754e9c7008599f7a","last_reissued_at":"2026-05-18T01:19:15.474328Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:19:15.474328Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1603.03501","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:19:15Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"eygiggdJ8vIObL4jnwk0K6GaQ9O3iXcoGBJ9jYkIMqKIYZRMn1EcmVJmtcHzgOFGl4S13RtEw9HUdaQZzl3dCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T21:38:32.871782Z"},"content_sha256":"f600953b3fa836ef3c4d54a01dd5e1e15f991c23bc0a716ee35edaf53ca6679b","schema_version":"1.0","event_id":"sha256:f600953b3fa836ef3c4d54a01dd5e1e15f991c23bc0a716ee35edaf53ca6679b"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:MWZE4EOLDPIHN6IPZKACW54GHQ","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"AccConF: An Access Control Framework for Leveraging In-Network Cached Data in ICNs","license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.NI","authors_text":"F. Natividad, H. Huang, N. Majd, R. Tourani, S. Misra, T. Mick","submitted_at":"2016-03-11T01:33:15Z","abstract_excerpt":"The fast-growing Internet traffic is increasingly becoming content-based and driven by mobile users, with users more interested in data rather than its source. This has precipitated the need for an information-centric Internet architecture. Research in information-centric networks (ICNs) have resulted in novel architectures, e.g., CCN/NDN, DONA, and PSIRP/PURSUIT; all agree on named data based addressing and pervasive caching as integral design components. With network-wide content caching, enforcement of content access control policies become non-trivial. Each caching node in the network need"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1603.03501","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:19:15Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"xE20AJat/HbDzQEgIj1W70c+aLtAcd6d+78BfMl6SpgcAikjovdNDPqwlp9lhQ93UAHqeWHfBWy12tgnwmp8AA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T21:38:32.872488Z"},"content_sha256":"45baa1134cd639c894ab166a013c0ed699820981c7c5868c0708ce64fdaec39d","schema_version":"1.0","event_id":"sha256:45baa1134cd639c894ab166a013c0ed699820981c7c5868c0708ce64fdaec39d"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/MWZE4EOLDPIHN6IPZKACW54GHQ/bundle.json","state_url":"https://pith.science/pith/MWZE4EOLDPIHN6IPZKACW54GHQ/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/MWZE4EOLDPIHN6IPZKACW54GHQ/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T21:38:32Z","links":{"resolver":"https://pith.science/pith/MWZE4EOLDPIHN6IPZKACW54GHQ","bundle":"https://pith.science/pith/MWZE4EOLDPIHN6IPZKACW54GHQ/bundle.json","state":"https://pith.science/pith/MWZE4EOLDPIHN6IPZKACW54GHQ/state.json","well_known_bundle":"https://pith.science/.well-known/pith/MWZE4EOLDPIHN6IPZKACW54GHQ/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:MWZE4EOLDPIHN6IPZKACW54GHQ","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"ea3c1ec94df7460a95fdb462f58ee55da1bd490db9cd0c87df11b5346dc2ea8b","cross_cats_sorted":["cs.CR"],"license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","primary_cat":"cs.NI","submitted_at":"2016-03-11T01:33:15Z","title_canon_sha256":"68f99b1b01bde0b6f792e38e2c3d01cedfecb2ed9fdaeec68736718241f1eee5"},"schema_version":"1.0","source":{"id":"1603.03501","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1603.03501","created_at":"2026-05-18T01:19:15Z"},{"alias_kind":"arxiv_version","alias_value":"1603.03501v1","created_at":"2026-05-18T01:19:15Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1603.03501","created_at":"2026-05-18T01:19:15Z"},{"alias_kind":"pith_short_12","alias_value":"MWZE4EOLDPIH","created_at":"2026-05-18T12:30:32Z"},{"alias_kind":"pith_short_16","alias_value":"MWZE4EOLDPIHN6IP","created_at":"2026-05-18T12:30:32Z"},{"alias_kind":"pith_short_8","alias_value":"MWZE4EOL","created_at":"2026-05-18T12:30:32Z"}],"graph_snapshots":[{"event_id":"sha256:45baa1134cd639c894ab166a013c0ed699820981c7c5868c0708ce64fdaec39d","target":"graph","created_at":"2026-05-18T01:19:15Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"The fast-growing Internet traffic is increasingly becoming content-based and driven by mobile users, with users more interested in data rather than its source. This has precipitated the need for an information-centric Internet architecture. Research in information-centric networks (ICNs) have resulted in novel architectures, e.g., CCN/NDN, DONA, and PSIRP/PURSUIT; all agree on named data based addressing and pervasive caching as integral design components. With network-wide content caching, enforcement of content access control policies become non-trivial. Each caching node in the network need","authors_text":"F. Natividad, H. Huang, N. Majd, R. Tourani, S. Misra, T. Mick","cross_cats":["cs.CR"],"headline":"","license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","primary_cat":"cs.NI","submitted_at":"2016-03-11T01:33:15Z","title":"AccConF: An Access Control Framework for Leveraging In-Network Cached Data in ICNs"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1603.03501","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:f600953b3fa836ef3c4d54a01dd5e1e15f991c23bc0a716ee35edaf53ca6679b","target":"record","created_at":"2026-05-18T01:19:15Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"ea3c1ec94df7460a95fdb462f58ee55da1bd490db9cd0c87df11b5346dc2ea8b","cross_cats_sorted":["cs.CR"],"license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","primary_cat":"cs.NI","submitted_at":"2016-03-11T01:33:15Z","title_canon_sha256":"68f99b1b01bde0b6f792e38e2c3d01cedfecb2ed9fdaeec68736718241f1eee5"},"schema_version":"1.0","source":{"id":"1603.03501","kind":"arxiv","version":1}},"canonical_sha256":"65b24e11cb1bd076f90fca802b77863c24b977bea5f1cafa754e9c7008599f7a","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"65b24e11cb1bd076f90fca802b77863c24b977bea5f1cafa754e9c7008599f7a","first_computed_at":"2026-05-18T01:19:15.474328Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:19:15.474328Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"ECd6H+M8Df49UzUVYOLwFCoHYJNco7BWfMxSyKT3i1KTBx8i+1BdosvZd4uStCzlO9ETZypFDJ+W4MIrMYhnCA==","signature_status":"signed_v1","signed_at":"2026-05-18T01:19:15.474711Z","signed_message":"canonical_sha256_bytes"},"source_id":"1603.03501","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:f600953b3fa836ef3c4d54a01dd5e1e15f991c23bc0a716ee35edaf53ca6679b","sha256:45baa1134cd639c894ab166a013c0ed699820981c7c5868c0708ce64fdaec39d"],"state_sha256":"88f3baa3495751cec97b7fefd1285a8c23f59ea228eb442d2b4b4e18258c43e3"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"uvbVmm+VJG4ehK29VBZjtXANWOrtv5rMT3mQBxIc5j1lR7WvSPK6AaR48WSiA9UgSxm7c2iJxvgxkNDBChrlCw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T21:38:32.876114Z","bundle_sha256":"5af2c2c43babb6e82125e2ec625c844865ab2012b4c86c0ea7ab6bb523dfa616"}}