{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2015:NPZNN7IAGJFP42I7N45V5H5GL2","short_pith_number":"pith:NPZNN7IA","schema_version":"1.0","canonical_sha256":"6bf2d6fd00324afe691f6f3b5e9fa65e893a17f86e8d3774afb8b22fc0b3f506","source":{"kind":"arxiv","id":"1508.06525","version":1},"attestation_state":"computed","paper":{"title":"Runtime Enforcement With Partial Control","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Rapha\\\"el Khoury, Sylvain Hall\\'e","submitted_at":"2015-08-26T15:08:23Z","abstract_excerpt":"This study carries forward the line of enquiry that seeks to characterize precisely which security policies are enforceable by runtime monitors. In this regard, Basin et al.\\ recently refined the structure that helps distinguish between those actions that the monitor can potentially suppress or insert in the execution, from those that the monitor can only observe. In this paper, we generalize this model by organizing the universe of possible actions in a lattice that naturally corresponds to the levels of monitor control. We then delineate the set of properties that are enforceable under this "},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1508.06525","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-08-26T15:08:23Z","cross_cats_sorted":[],"title_canon_sha256":"c637f333a732f698c947897cdd3307471c5b774d7db9f687761a459bd9372149","abstract_canon_sha256":"1319eab39575098a4804bfe8bd7e0a5fa8207ce477c687f7830a6ff61f3e3a0b"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:34:42.812627Z","signature_b64":"MmYW4aHwTxAjMdxYuF095ZqQsUuNeI5g0qkGh4oDVa1BK+Aysj2FvPBCQfnkypeZTI3RGtPRWi4PEtstCLaMDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"6bf2d6fd00324afe691f6f3b5e9fa65e893a17f86e8d3774afb8b22fc0b3f506","last_reissued_at":"2026-05-18T01:34:42.811956Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:34:42.811956Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Runtime Enforcement With Partial Control","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Rapha\\\"el Khoury, Sylvain Hall\\'e","submitted_at":"2015-08-26T15:08:23Z","abstract_excerpt":"This study carries forward the line of enquiry that seeks to characterize precisely which security policies are enforceable by runtime monitors. In this regard, Basin et al.\\ recently refined the structure that helps distinguish between those actions that the monitor can potentially suppress or insert in the execution, from those that the monitor can only observe. In this paper, we generalize this model by organizing the universe of possible actions in a lattice that naturally corresponds to the levels of monitor control. We then delineate the set of properties that are enforceable under this "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1508.06525","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1508.06525","created_at":"2026-05-18T01:34:42.812053+00:00"},{"alias_kind":"arxiv_version","alias_value":"1508.06525v1","created_at":"2026-05-18T01:34:42.812053+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1508.06525","created_at":"2026-05-18T01:34:42.812053+00:00"},{"alias_kind":"pith_short_12","alias_value":"NPZNN7IAGJFP","created_at":"2026-05-18T12:29:34.919912+00:00"},{"alias_kind":"pith_short_16","alias_value":"NPZNN7IAGJFP42I7","created_at":"2026-05-18T12:29:34.919912+00:00"},{"alias_kind":"pith_short_8","alias_value":"NPZNN7IA","created_at":"2026-05-18T12:29:34.919912+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/NPZNN7IAGJFP42I7N45V5H5GL2","json":"https://pith.science/pith/NPZNN7IAGJFP42I7N45V5H5GL2.json","graph_json":"https://pith.science/api/pith-number/NPZNN7IAGJFP42I7N45V5H5GL2/graph.json","events_json":"https://pith.science/api/pith-number/NPZNN7IAGJFP42I7N45V5H5GL2/events.json","paper":"https://pith.science/paper/NPZNN7IA"},"agent_actions":{"view_html":"https://pith.science/pith/NPZNN7IAGJFP42I7N45V5H5GL2","download_json":"https://pith.science/pith/NPZNN7IAGJFP42I7N45V5H5GL2.json","view_paper":"https://pith.science/paper/NPZNN7IA","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1508.06525&json=true","fetch_graph":"https://pith.science/api/pith-number/NPZNN7IAGJFP42I7N45V5H5GL2/graph.json","fetch_events":"https://pith.science/api/pith-number/NPZNN7IAGJFP42I7N45V5H5GL2/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/NPZNN7IAGJFP42I7N45V5H5GL2/action/timestamp_anchor","attest_storage":"https://pith.science/pith/NPZNN7IAGJFP42I7N45V5H5GL2/action/storage_attestation","attest_author":"https://pith.science/pith/NPZNN7IAGJFP42I7N45V5H5GL2/action/author_attestation","sign_citation":"https://pith.science/pith/NPZNN7IAGJFP42I7N45V5H5GL2/action/citation_signature","submit_replication":"https://pith.science/pith/NPZNN7IAGJFP42I7N45V5H5GL2/action/replication_record"}},"created_at":"2026-05-18T01:34:42.812053+00:00","updated_at":"2026-05-18T01:34:42.812053+00:00"}