{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:V2FRC5LED4EQ2R7DK2FDFVN7VS","short_pith_number":"pith:V2FRC5LE","canonical_record":{"source":{"id":"1802.00230","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DB","submitted_at":"2018-02-01T10:30:20Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"caa77066f3546a23bcb980230fc3bb5eac863116e3025c70c833a7c3a8df484a","abstract_canon_sha256":"ea5e21a663f438628ac5e29f62022b66d20a949ec557d271acf086add503ee84"},"schema_version":"1.0"},"canonical_sha256":"ae8b1175641f090d47e3568a32d5bfacada5e40d6f1f71dc53d5526cb3b23b53","source":{"kind":"arxiv","id":"1802.00230","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1802.00230","created_at":"2026-05-18T00:24:36Z"},{"alias_kind":"arxiv_version","alias_value":"1802.00230v1","created_at":"2026-05-18T00:24:36Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1802.00230","created_at":"2026-05-18T00:24:36Z"},{"alias_kind":"pith_short_12","alias_value":"V2FRC5LED4EQ","created_at":"2026-05-18T12:32:56Z"},{"alias_kind":"pith_short_16","alias_value":"V2FRC5LED4EQ2R7D","created_at":"2026-05-18T12:32:56Z"},{"alias_kind":"pith_short_8","alias_value":"V2FRC5LE","created_at":"2026-05-18T12:32:56Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:V2FRC5LED4EQ2R7DK2FDFVN7VS","target":"record","payload":{"canonical_record":{"source":{"id":"1802.00230","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DB","submitted_at":"2018-02-01T10:30:20Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"caa77066f3546a23bcb980230fc3bb5eac863116e3025c70c833a7c3a8df484a","abstract_canon_sha256":"ea5e21a663f438628ac5e29f62022b66d20a949ec557d271acf086add503ee84"},"schema_version":"1.0"},"canonical_sha256":"ae8b1175641f090d47e3568a32d5bfacada5e40d6f1f71dc53d5526cb3b23b53","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:24:36.501336Z","signature_b64":"Tbze7d2IHbH+38MDmzZ2ZjcaPvKgg9Kk3kL/1eU1kq9fZbYFc0SVGG0uUSnqWDINLclSfkvbOK5kWVYri5okCw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"ae8b1175641f090d47e3568a32d5bfacada5e40d6f1f71dc53d5526cb3b23b53","last_reissued_at":"2026-05-18T00:24:36.500860Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:24:36.500860Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1802.00230","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:24:36Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"dCBTw2SDwgTmwIwNEAqzcE4g58pFQv+7ss7O+L/0byGmOgc64+bzpeA7aO6q3BP4s+i4GNZIKkZNAhPLl5K5DA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T21:52:12.187408Z"},"content_sha256":"3171c3a24c234aba19cdb935d97b1b7a9b6fdc92ba07d57a627b65b08533ac97","schema_version":"1.0","event_id":"sha256:3171c3a24c234aba19cdb935d97b1b7a9b6fdc92ba07d57a627b65b08533ac97"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:V2FRC5LED4EQ2R7DK2FDFVN7VS","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Integrity Coded Databases: An Evaluation of Performance, Efficiency, and Practicality","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.DB","authors_text":"Dan Kondratyuk, Elmer Duran, Jake Rodden","submitted_at":"2018-02-01T10:30:20Z","abstract_excerpt":"In recent years, cloud database storage has become an inexpensive and convenient option for businesses and individuals to store information. While its positive aspects make the cloud extremely attractive for data storage, it is a relatively new area of service, making it vulnerable to cyber-attacks and security breaches. Storing data in a foreign location also requires the owner to relinquish control of their information to system administrators of these online database services. This opens the possibility for malicious, internal attacks on the data that may involve the manipulation, omission,"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1802.00230","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:24:36Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"DMERCq8eCIc/a2JO62u8VxVWvDbwUgsON5cizewYS5+Zzqg/lxQY+B5/9Yoy9Lb7LvfvZSCrcKBBUXE7Cn16BA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T21:52:12.188067Z"},"content_sha256":"008d8d7336c22bbc6067389466c10bfdf78165e4fc7a2be84129d367605481bc","schema_version":"1.0","event_id":"sha256:008d8d7336c22bbc6067389466c10bfdf78165e4fc7a2be84129d367605481bc"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/V2FRC5LED4EQ2R7DK2FDFVN7VS/bundle.json","state_url":"https://pith.science/pith/V2FRC5LED4EQ2R7DK2FDFVN7VS/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/V2FRC5LED4EQ2R7DK2FDFVN7VS/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T21:52:12Z","links":{"resolver":"https://pith.science/pith/V2FRC5LED4EQ2R7DK2FDFVN7VS","bundle":"https://pith.science/pith/V2FRC5LED4EQ2R7DK2FDFVN7VS/bundle.json","state":"https://pith.science/pith/V2FRC5LED4EQ2R7DK2FDFVN7VS/state.json","well_known_bundle":"https://pith.science/.well-known/pith/V2FRC5LED4EQ2R7DK2FDFVN7VS/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:V2FRC5LED4EQ2R7DK2FDFVN7VS","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"ea5e21a663f438628ac5e29f62022b66d20a949ec557d271acf086add503ee84","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DB","submitted_at":"2018-02-01T10:30:20Z","title_canon_sha256":"caa77066f3546a23bcb980230fc3bb5eac863116e3025c70c833a7c3a8df484a"},"schema_version":"1.0","source":{"id":"1802.00230","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1802.00230","created_at":"2026-05-18T00:24:36Z"},{"alias_kind":"arxiv_version","alias_value":"1802.00230v1","created_at":"2026-05-18T00:24:36Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1802.00230","created_at":"2026-05-18T00:24:36Z"},{"alias_kind":"pith_short_12","alias_value":"V2FRC5LED4EQ","created_at":"2026-05-18T12:32:56Z"},{"alias_kind":"pith_short_16","alias_value":"V2FRC5LED4EQ2R7D","created_at":"2026-05-18T12:32:56Z"},{"alias_kind":"pith_short_8","alias_value":"V2FRC5LE","created_at":"2026-05-18T12:32:56Z"}],"graph_snapshots":[{"event_id":"sha256:008d8d7336c22bbc6067389466c10bfdf78165e4fc7a2be84129d367605481bc","target":"graph","created_at":"2026-05-18T00:24:36Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In recent years, cloud database storage has become an inexpensive and convenient option for businesses and individuals to store information. While its positive aspects make the cloud extremely attractive for data storage, it is a relatively new area of service, making it vulnerable to cyber-attacks and security breaches. Storing data in a foreign location also requires the owner to relinquish control of their information to system administrators of these online database services. This opens the possibility for malicious, internal attacks on the data that may involve the manipulation, omission,","authors_text":"Dan Kondratyuk, Elmer Duran, Jake Rodden","cross_cats":["cs.CR"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DB","submitted_at":"2018-02-01T10:30:20Z","title":"Integrity Coded Databases: An Evaluation of Performance, Efficiency, and Practicality"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1802.00230","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:3171c3a24c234aba19cdb935d97b1b7a9b6fdc92ba07d57a627b65b08533ac97","target":"record","created_at":"2026-05-18T00:24:36Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"ea5e21a663f438628ac5e29f62022b66d20a949ec557d271acf086add503ee84","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DB","submitted_at":"2018-02-01T10:30:20Z","title_canon_sha256":"caa77066f3546a23bcb980230fc3bb5eac863116e3025c70c833a7c3a8df484a"},"schema_version":"1.0","source":{"id":"1802.00230","kind":"arxiv","version":1}},"canonical_sha256":"ae8b1175641f090d47e3568a32d5bfacada5e40d6f1f71dc53d5526cb3b23b53","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"ae8b1175641f090d47e3568a32d5bfacada5e40d6f1f71dc53d5526cb3b23b53","first_computed_at":"2026-05-18T00:24:36.500860Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:24:36.500860Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"Tbze7d2IHbH+38MDmzZ2ZjcaPvKgg9Kk3kL/1eU1kq9fZbYFc0SVGG0uUSnqWDINLclSfkvbOK5kWVYri5okCw==","signature_status":"signed_v1","signed_at":"2026-05-18T00:24:36.501336Z","signed_message":"canonical_sha256_bytes"},"source_id":"1802.00230","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:3171c3a24c234aba19cdb935d97b1b7a9b6fdc92ba07d57a627b65b08533ac97","sha256:008d8d7336c22bbc6067389466c10bfdf78165e4fc7a2be84129d367605481bc"],"state_sha256":"5754376355258e480d9e499a2b977cae3cd3ed9bf95cfdf48110def91e694d9c"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"NOrcDp7Nm5XXMwT10H5RAj8sd1NUdX4gyLiCg1wvkeva2Pxax56jcw3iUduAKmgO+F/QqSnw1sbHrtunqtB5AQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T21:52:12.191174Z","bundle_sha256":"e75b0141970c90aaa892d16f074876cff7ac0a1e2ccb083668b05cd14a77fe63"}}