feat: add draft data, gap analysis report, and workspace config
Some checks failed
CI / test (3.11) (push) Failing after 1m37s
CI / test (3.12) (push) Failing after 57s

This commit is contained in:
2026-04-06 18:47:15 +02:00
parent 4f310407b0
commit 2506b6325a
189 changed files with 62649 additions and 0 deletions

View File

@@ -0,0 +1,12 @@
.PHONY: pdf clean
pdf: main.pdf
main.pdf: main.tex references.bib
pdflatex -interaction=nonstopmode main.tex
bibtex main
pdflatex -interaction=nonstopmode main.tex
pdflatex -interaction=nonstopmode main.tex
clean:
rm -f main.aux main.bbl main.blg main.log main.out main.pdf main.toc

View File

@@ -0,0 +1,119 @@
\relax
\providecommand\hyper@newdestlabel[2]{}
\providecommand\HyperFirstAtBeginDocument{\AtBeginDocument}
\HyperFirstAtBeginDocument{\ifx\hyper@anchor\@undefined
\global\let\oldnewlabel\newlabel
\gdef\newlabel#1#2{\newlabelxx{#1}#2}
\gdef\newlabelxx#1#2#3#4#5#6{\oldnewlabel{#1}{{#2}{#3}}}
\AtEndDocument{\ifx\hyper@anchor\@undefined
\let\newlabel\oldnewlabel
\fi}
\fi}
\global\let\hyper@last\relax
\gdef\HyperFirstAtBeginDocument#1{#1}
\providecommand\HyField@AuxAddToFields[1]{}
\providecommand\HyField@AuxAddToCoFields[2]{}
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{1}{section.1}\protected@file@percent }
\citation{wimse-arch}
\citation{wimse-arch}
\citation{spiffe}
\@writefile{toc}{\contentsline {section}{\numberline {2}Background}{2}{section.2}\protected@file@percent }
\newlabel{sec:background}{{2}{2}{Background}{section.2}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1}IETF AI Agent Standardization}{2}{subsection.2.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2}WIMSE Architecture}{2}{subsection.2.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3}The Identity--Authorization--Execution Stack}{2}{subsection.2.3}\protected@file@percent }
\citation{landscape-survey}
\@writefile{toc}{\contentsline {section}{\numberline {3}Landscape Analysis: Motivating Evidence}{3}{section.3}\protected@file@percent }
\newlabel{sec:landscape}{{3}{3}{Landscape Analysis: Motivating Evidence}{section.3}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1}Corpus Overview}{3}{subsection.3.1}\protected@file@percent }
\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Corpus summary statistics.\relax }}{3}{table.caption.1}\protected@file@percent }
\providecommand*\caption@xref[2]{\@setref\relax\@undefined{#1}}
\newlabel{tab:corpus}{{1}{3}{Corpus summary statistics.\relax }{table.caption.1}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2}Category Distribution and the Safety Deficit}{3}{subsection.3.2}\protected@file@percent }
\@writefile{lot}{\contentsline {table}{\numberline {2}{\ignorespaces Category distribution organized by accountability tier.\relax }}{3}{table.caption.2}\protected@file@percent }
\newlabel{tab:tiers}{{2}{3}{Category distribution organized by accountability tier.\relax }{table.caption.2}{}}
\citation{rfc7519}
\citation{rfc7515}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.3}The Overlap Problem}{4}{subsection.3.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4}Gaps Relevant to Execution Tracking}{4}{subsection.3.4}\protected@file@percent }
\newlabel{sec:landscape-gaps}{{3.4}{4}{Gaps Relevant to Execution Tracking}{subsection.3.4}{}}
\@writefile{lot}{\contentsline {table}{\numberline {3}{\ignorespaces Execution-layer gaps in the IETF landscape.\relax }}{4}{table.caption.3}\protected@file@percent }
\newlabel{tab:exec-gaps}{{3}{4}{Execution-layer gaps in the IETF landscape.\relax }{table.caption.3}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4}Execution Context Token Specification}{4}{section.4}\protected@file@percent }
\newlabel{sec:ect}{{4}{4}{Execution Context Token Specification}{section.4}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}Design Principles}{4}{subsection.4.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Token Structure}{5}{subsection.4.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.2.1}JOSE Header}{5}{subsubsection.4.2.1}\protected@file@percent }
\@writefile{lol}{\contentsline {lstlisting}{\numberline {1}{\ignorespaces ECT JOSE Header.}}{5}{lstlisting.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.2.2}Claims}{5}{subsubsection.4.2.2}\protected@file@percent }
\@writefile{lol}{\contentsline {lstlisting}{\numberline {2}{\ignorespaces Complete ECT payload example.}}{5}{lstlisting.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3}DAG Construction and Validation}{5}{subsection.4.3}\protected@file@percent }
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces A five-task DAG representing a cross-organization financial workflow. Task\nobreakspace {}A (root) fetches data; Tasks\nobreakspace {}B and\nobreakspace {}C execute in parallel (fan-out); Task\nobreakspace {}D merges results (fan-in); Task\nobreakspace {}E performs the final action. Each task references its predecessors via the \texttt {par} claim.\relax }}{6}{figure.caption.4}\protected@file@percent }
\newlabel{fig:dag}{{1}{6}{A five-task DAG representing a cross-organization financial workflow. Task~A (root) fetches data; Tasks~B and~C execute in parallel (fan-out); Task~D merges results (fan-in); Task~E performs the final action. Each task references its predecessors via the \texttt {par} claim.\relax }{figure.caption.4}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4}Verification Procedure}{6}{subsection.4.4}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5}HTTP Transport}{6}{subsection.4.5}\protected@file@percent }
\@writefile{lol}{\contentsline {lstlisting}{\numberline {3}{\ignorespaces HTTP request with WIMSE identity and ECT.}}{6}{lstlisting.3}\protected@file@percent }
\citation{daap-v2}
\citation{stamp}
\citation{agentic-jwt}
\citation{verif-conv}
\citation{trans-att}
\citation{txn-tokens}
\citation{actor-chain}
\citation{hjs}
\citation{actor-chain}
\citation{txn-tokens}
\citation{stamp}
\@writefile{lot}{\contentsline {table}{\numberline {4}{\ignorespaces ECT verification procedure (13 steps in 4 phases).\relax }}{7}{table.caption.5}\protected@file@percent }
\newlabel{tab:verify}{{4}{7}{ECT verification procedure (13 steps in 4 phases).\relax }{table.caption.5}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6}Audit Ledger Interface}{7}{subsection.4.6}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5}Comparative Analysis Against the Landscape}{7}{section.5}\protected@file@percent }
\newlabel{sec:comparison}{{5}{7}{Comparative Analysis Against the Landscape}{section.5}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Comparison Framework}{7}{subsection.5.1}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2}Head-to-Head Comparison}{7}{subsection.5.2}\protected@file@percent }
\citation{daap-v2}
\citation{trans-att}
\citation{hjs}
\@writefile{lot}{\contentsline {table}{\numberline {5}{\ignorespaces Feature comparison: ECT vs.\ eight competing/complementary proposals. {\fontfamily {pzd}\fontencoding {U}\fontseries {m}\fontshape {n}\selectfont \char 51} = full, $\sim $ = partial, {\fontfamily {pzd}\fontencoding {U}\fontseries {m}\fontshape {n}\selectfont \char 55} = none.\relax }}{8}{table.caption.6}\protected@file@percent }
\newlabel{tab:comparison}{{5}{8}{Feature comparison: ECT vs.\ eight competing/complementary proposals. \ding {51} = full, $\sim $ = partial, \ding {55} = none.\relax }{table.caption.6}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3}Uniqueness Quantification}{8}{subsection.5.3}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6}Gap Coverage Analysis}{8}{section.6}\protected@file@percent }
\newlabel{sec:gaps}{{6}{8}{Gap Coverage Analysis}{section.6}{}}
\citation{trans-att}
\@writefile{lot}{\contentsline {table}{\numberline {6}{\ignorespaces ECT coverage of the 12 identified landscape gaps.\relax }}{9}{table.caption.7}\protected@file@percent }
\newlabel{tab:all-gaps}{{6}{9}{ECT coverage of the 12 identified landscape gaps.\relax }{table.caption.7}{}}
\@writefile{toc}{\contentsline {section}{\numberline {7}Discussion and Limitations}{9}{section.7}\protected@file@percent }
\newlabel{sec:discussion}{{7}{9}{Discussion and Limitations}{section.7}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {7.1}The Self-Assertion Limitation}{9}{subsection.7.1}\protected@file@percent }
\citation{opentelemetry}
\citation{w3c-prov}
\citation{scitt}
\citation{hjs}
\@writefile{toc}{\contentsline {subsection}{\numberline {7.2}Scalability Considerations}{10}{subsection.7.2}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3}Adoption Path}{10}{subsection.7.3}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {7.4}Limitations of the Landscape Analysis}{10}{subsection.7.4}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {8}Related Work}{10}{section.8}\protected@file@percent }
\newlabel{sec:related}{{8}{10}{Related Work}{section.8}{}}
\citation{ect-draft}
\bibstyle{plain}
\bibdata{references}
\bibcite{daap-v2}{1}
\bibcite{verif-conv}{2}
\bibcite{agentic-jwt}{3}
\bibcite{stamp}{4}
\bibcite{scitt}{5}
\bibcite{rfc7515}{6}
\bibcite{rfc7519}{7}
\bibcite{w3c-prov}{8}
\@writefile{toc}{\contentsline {section}{\numberline {9}Conclusion and Future Work}{11}{section.9}\protected@file@percent }
\newlabel{sec:conclusion}{{9}{11}{Conclusion and Future Work}{section.9}{}}
\bibcite{actor-chain}{9}
\bibcite{trans-att}{10}
\bibcite{ect-draft}{11}
\bibcite{landscape-survey}{12}
\bibcite{txn-tokens}{13}
\bibcite{opentelemetry}{14}
\bibcite{spiffe}{15}
\bibcite{hjs}{16}
\bibcite{wimse-arch}{17}
\gdef \@abspage@last{12}

View File

@@ -0,0 +1,93 @@
\begin{thebibliography}{10}
\bibitem{daap-v2}
Jonathan Aylward.
\newblock {Distributed AI Accountability Protocol (DAAP) Version 2.0}.
\newblock Internet-Draft draft-aylward-daap-v2, 2026.
\bibitem{verif-conv}
Henk Birkholz.
\newblock {Verifiable Agent Conversation Records}.
\newblock Internet-Draft draft-birkholz-verifiable-agent-conversations, 2025.
\bibitem{agentic-jwt}
Anirudh Goswami.
\newblock {Secure Intent Protocol: JWT Compatible Agentic Identity and Workflow
Management}.
\newblock Internet-Draft draft-goswami-agentic-jwt, 2025.
\bibitem{stamp}
Bary Guy.
\newblock {Secure Task-bound Agent Message Proof (STAMP) Protocol}.
\newblock Internet-Draft draft-guy-bary-stamp-protocol, 2025.
\bibitem{scitt}
{IETF SCITT Working Group}.
\newblock {Supply Chain Integrity, Transparency, and Trust (SCITT)}.
\newblock Internet-Draft, 2024.
\bibitem{rfc7515}
M.~Jones, J.~Bradley, and N.~Sakimura.
\newblock {JSON Web Signature (JWS)}.
\newblock RFC 7515, 2015.
\bibitem{rfc7519}
M.~Jones, J.~Bradley, and N.~Sakimura.
\newblock {JSON Web Token (JWT)}.
\newblock RFC 7519, 2015.
\bibitem{w3c-prov}
Luc Moreau and Paolo Missier.
\newblock {PROV-DM: The PROV Data Model}.
\newblock W3C Recommendation, 2013.
\bibitem{actor-chain}
{MW et al.}
\newblock {Cryptographically Verifiable Actor Chain for OAuth 2.0 Token
Exchange}.
\newblock Internet-Draft draft-mw-spice-actor-chain, 2025.
\bibitem{trans-att}
{MW et al.}
\newblock {Transitive Attestation for Sovereign Workloads: A WIMSE Profile}.
\newblock Internet-Draft draft-mw-wimse-transitive-attestation, 2025.
\bibitem{ect-draft}
Christian Nennemann.
\newblock {Execution Context Tokens for Distributed Agentic Workflows}.
\newblock Internet-Draft draft-nennemann-wimse-ect-00, February 2026.
\bibitem{landscape-survey}
Christian Nennemann.
\newblock {The AI Agent Standardization Wave: A Quantitative Analysis of 260
IETF Internet-Drafts on Autonomous Agents and Artificial Intelligence}.
\newblock arXiv preprint, 2026.
\newblock Companion landscape survey paper.
\bibitem{txn-tokens}
{OAuth Working Group}.
\newblock {Transaction Tokens For Agents}.
\newblock Internet-Draft draft-oauth-transaction-tokens-for-agents, 2025.
\bibitem{opentelemetry}
{OpenTelemetry Project}.
\newblock {OpenTelemetry Specification}.
\newblock CNCF Project, 2024.
\bibitem{spiffe}
{SPIFFE Project}.
\newblock {SPIFFE: Secure Production Identity Framework for Everyone}.
\newblock CNCF Project, 2024.
\bibitem{hjs}
et~al. Wang.
\newblock {HJS: An Accountability Layer for AI Agents}.
\newblock Internet-Draft draft-wang-hjs-accountability, 2025.
\bibitem{wimse-arch}
{WIMSE Working Group}.
\newblock {Workload Identity in Multi System Environments (WIMSE)
Architecture}.
\newblock Internet-Draft, 2025.
\end{thebibliography}

View File

@@ -0,0 +1,46 @@
This is BibTeX, Version 0.99d (TeX Live 2023)
Capacity: max_strings=200000, hash_size=200000, hash_prime=170003
The top-level auxiliary file: main.aux
The style file: plain.bst
Database file #1: references.bib
You've used 17 entries,
2118 wiz_defined-function locations,
567 strings with 5907 characters,
and the built_in function-call counts, 3739 in all, are:
= -- 355
> -- 147
< -- 0
+ -- 61
- -- 44
* -- 128
:= -- 638
add.period$ -- 52
call.type$ -- 17
change.case$ -- 73
chr.to.int$ -- 0
cite$ -- 17
duplicate$ -- 119
empty$ -- 375
format.name$ -- 44
if$ -- 816
int.to.chr$ -- 0
int.to.str$ -- 17
missing$ -- 0
newline$ -- 89
num.names$ -- 34
pop$ -- 141
preamble$ -- 1
purify$ -- 56
quote$ -- 0
skip$ -- 118
stack$ -- 0
substring$ -- 85
swap$ -- 17
text.length$ -- 0
text.prefix$ -- 0
top$ -- 0
type$ -- 68
warning$ -- 0
while$ -- 34
width$ -- 19
write$ -- 174

View File

@@ -0,0 +1,996 @@
This is pdfTeX, Version 3.141592653-2.6-1.40.25 (TeX Live 2023) (preloaded format=pdflatex 2026.2.27) 28 FEB 2026 16:17
entering extended mode
restricted \write18 enabled.
%&-line parsing enabled.
**main.tex
(./main.tex
LaTeX2e <2022-11-01> patch level 1
L3 programming layer <2023-02-22>
(/usr/share/texlive/texmf-dist/tex/latex/base/article.cls
Document Class: article 2022/07/02 v1.4n Standard LaTeX document class
(/usr/share/texlive/texmf-dist/tex/latex/base/size11.clo
File: size11.clo 2022/07/02 v1.4n Standard LaTeX file (size option)
)
\c@part=\count185
\c@section=\count186
\c@subsection=\count187
\c@subsubsection=\count188
\c@paragraph=\count189
\c@subparagraph=\count190
\c@figure=\count191
\c@table=\count192
\abovecaptionskip=\skip48
\belowcaptionskip=\skip49
\bibindent=\dimen140
)
(/usr/share/texlive/texmf-dist/tex/latex/base/inputenc.sty
Package: inputenc 2021/02/14 v1.3d Input encoding file
\inpenc@prehook=\toks16
\inpenc@posthook=\toks17
)
(/usr/share/texlive/texmf-dist/tex/latex/base/fontenc.sty
Package: fontenc 2021/04/29 v2.0v Standard LaTeX package
)
(/usr/share/texlive/texmf-dist/tex/latex/lm/lmodern.sty
Package: lmodern 2015/05/01 v1.6.1 Latin Modern Fonts
LaTeX Font Info: Overwriting symbol font `operators' in version `normal'
(Font) OT1/cmr/m/n --> OT1/lmr/m/n on input line 22.
LaTeX Font Info: Overwriting symbol font `letters' in version `normal'
(Font) OML/cmm/m/it --> OML/lmm/m/it on input line 23.
LaTeX Font Info: Overwriting symbol font `symbols' in version `normal'
(Font) OMS/cmsy/m/n --> OMS/lmsy/m/n on input line 24.
LaTeX Font Info: Overwriting symbol font `largesymbols' in version `normal'
(Font) OMX/cmex/m/n --> OMX/lmex/m/n on input line 25.
LaTeX Font Info: Overwriting symbol font `operators' in version `bold'
(Font) OT1/cmr/bx/n --> OT1/lmr/bx/n on input line 26.
LaTeX Font Info: Overwriting symbol font `letters' in version `bold'
(Font) OML/cmm/b/it --> OML/lmm/b/it on input line 27.
LaTeX Font Info: Overwriting symbol font `symbols' in version `bold'
(Font) OMS/cmsy/b/n --> OMS/lmsy/b/n on input line 28.
LaTeX Font Info: Overwriting symbol font `largesymbols' in version `bold'
(Font) OMX/cmex/m/n --> OMX/lmex/m/n on input line 29.
LaTeX Font Info: Overwriting math alphabet `\mathbf' in version `normal'
(Font) OT1/cmr/bx/n --> OT1/lmr/bx/n on input line 31.
LaTeX Font Info: Overwriting math alphabet `\mathsf' in version `normal'
(Font) OT1/cmss/m/n --> OT1/lmss/m/n on input line 32.
LaTeX Font Info: Overwriting math alphabet `\mathit' in version `normal'
(Font) OT1/cmr/m/it --> OT1/lmr/m/it on input line 33.
LaTeX Font Info: Overwriting math alphabet `\mathtt' in version `normal'
(Font) OT1/cmtt/m/n --> OT1/lmtt/m/n on input line 34.
LaTeX Font Info: Overwriting math alphabet `\mathbf' in version `bold'
(Font) OT1/cmr/bx/n --> OT1/lmr/bx/n on input line 35.
LaTeX Font Info: Overwriting math alphabet `\mathsf' in version `bold'
(Font) OT1/cmss/bx/n --> OT1/lmss/bx/n on input line 36.
LaTeX Font Info: Overwriting math alphabet `\mathit' in version `bold'
(Font) OT1/cmr/bx/it --> OT1/lmr/bx/it on input line 37.
LaTeX Font Info: Overwriting math alphabet `\mathtt' in version `bold'
(Font) OT1/cmtt/m/n --> OT1/lmtt/m/n on input line 38.
)
(/usr/share/texlive/texmf-dist/tex/latex/geometry/geometry.sty
Package: geometry 2020/01/02 v5.9 Page Geometry
(/usr/share/texlive/texmf-dist/tex/latex/graphics/keyval.sty
Package: keyval 2022/05/29 v1.15 key=value parser (DPC)
\KV@toks@=\toks18
)
(/usr/share/texlive/texmf-dist/tex/generic/iftex/ifvtex.sty
Package: ifvtex 2019/10/25 v1.7 ifvtex legacy package. Use iftex instead.
(/usr/share/texlive/texmf-dist/tex/generic/iftex/iftex.sty
Package: iftex 2022/02/03 v1.0f TeX engine tests
))
\Gm@cnth=\count193
\Gm@cntv=\count194
\c@Gm@tempcnt=\count195
\Gm@bindingoffset=\dimen141
\Gm@wd@mp=\dimen142
\Gm@odd@mp=\dimen143
\Gm@even@mp=\dimen144
\Gm@layoutwidth=\dimen145
\Gm@layoutheight=\dimen146
\Gm@layouthoffset=\dimen147
\Gm@layoutvoffset=\dimen148
\Gm@dimlist=\toks19
)
(/usr/share/texlive/texmf-dist/tex/latex/graphics/graphicx.sty
Package: graphicx 2021/09/16 v1.2d Enhanced LaTeX Graphics (DPC,SPQR)
(/usr/share/texlive/texmf-dist/tex/latex/graphics/graphics.sty
Package: graphics 2022/03/10 v1.4e Standard LaTeX Graphics (DPC,SPQR)
(/usr/share/texlive/texmf-dist/tex/latex/graphics/trig.sty
Package: trig 2021/08/11 v1.11 sin cos tan (DPC)
)
(/usr/share/texlive/texmf-dist/tex/latex/graphics-cfg/graphics.cfg
File: graphics.cfg 2016/06/04 v1.11 sample graphics configuration
)
Package graphics Info: Driver file: pdftex.def on input line 107.
(/usr/share/texlive/texmf-dist/tex/latex/graphics-def/pdftex.def
File: pdftex.def 2022/09/22 v1.2b Graphics/color driver for pdftex
))
\Gin@req@height=\dimen149
\Gin@req@width=\dimen150
)
(/usr/share/texlive/texmf-dist/tex/latex/booktabs/booktabs.sty
Package: booktabs 2020/01/12 v1.61803398 Publication quality tables
\heavyrulewidth=\dimen151
\lightrulewidth=\dimen152
\cmidrulewidth=\dimen153
\belowrulesep=\dimen154
\belowbottomsep=\dimen155
\aboverulesep=\dimen156
\abovetopsep=\dimen157
\cmidrulesep=\dimen158
\cmidrulekern=\dimen159
\defaultaddspace=\dimen160
\@cmidla=\count196
\@cmidlb=\count197
\@aboverulesep=\dimen161
\@belowrulesep=\dimen162
\@thisruleclass=\count198
\@lastruleclass=\count199
\@thisrulewidth=\dimen163
)
(/usr/share/texlive/texmf-dist/tex/latex/hyperref/hyperref.sty
Package: hyperref 2023-02-07 v7.00v Hypertext links for LaTeX
(/usr/share/texlive/texmf-dist/tex/generic/ltxcmds/ltxcmds.sty
Package: ltxcmds 2020-05-10 v1.25 LaTeX kernel commands for general use (HO)
)
(/usr/share/texlive/texmf-dist/tex/generic/pdftexcmds/pdftexcmds.sty
Package: pdftexcmds 2020-06-27 v0.33 Utility functions of pdfTeX for LuaTeX (HO
)
(/usr/share/texlive/texmf-dist/tex/generic/infwarerr/infwarerr.sty
Package: infwarerr 2019/12/03 v1.5 Providing info/warning/error messages (HO)
)
Package pdftexcmds Info: \pdf@primitive is available.
Package pdftexcmds Info: \pdf@ifprimitive is available.
Package pdftexcmds Info: \pdfdraftmode found.
)
(/usr/share/texlive/texmf-dist/tex/latex/kvsetkeys/kvsetkeys.sty
Package: kvsetkeys 2022-10-05 v1.19 Key value parser (HO)
)
(/usr/share/texlive/texmf-dist/tex/generic/kvdefinekeys/kvdefinekeys.sty
Package: kvdefinekeys 2019-12-19 v1.6 Define keys (HO)
)
(/usr/share/texlive/texmf-dist/tex/generic/pdfescape/pdfescape.sty
Package: pdfescape 2019/12/09 v1.15 Implements pdfTeX's escape features (HO)
)
(/usr/share/texlive/texmf-dist/tex/latex/hycolor/hycolor.sty
Package: hycolor 2020-01-27 v1.10 Color options for hyperref/bookmark (HO)
)
(/usr/share/texlive/texmf-dist/tex/latex/letltxmacro/letltxmacro.sty
Package: letltxmacro 2019/12/03 v1.6 Let assignment for LaTeX macros (HO)
)
(/usr/share/texlive/texmf-dist/tex/latex/auxhook/auxhook.sty
Package: auxhook 2019-12-17 v1.6 Hooks for auxiliary files (HO)
)
(/usr/share/texlive/texmf-dist/tex/latex/hyperref/nameref.sty
Package: nameref 2022-05-17 v2.50 Cross-referencing by name of section
(/usr/share/texlive/texmf-dist/tex/latex/refcount/refcount.sty
Package: refcount 2019/12/15 v3.6 Data extraction from label references (HO)
)
(/usr/share/texlive/texmf-dist/tex/generic/gettitlestring/gettitlestring.sty
Package: gettitlestring 2019/12/15 v1.6 Cleanup title references (HO)
(/usr/share/texlive/texmf-dist/tex/latex/kvoptions/kvoptions.sty
Package: kvoptions 2022-06-15 v3.15 Key value format for package options (HO)
))
\c@section@level=\count266
)
\@linkdim=\dimen164
\Hy@linkcounter=\count267
\Hy@pagecounter=\count268
(/usr/share/texlive/texmf-dist/tex/latex/hyperref/pd1enc.def
File: pd1enc.def 2023-02-07 v7.00v Hyperref: PDFDocEncoding definition (HO)
Now handling font encoding PD1 ...
... no UTF-8 mapping file for font encoding PD1
)
(/usr/share/texlive/texmf-dist/tex/generic/intcalc/intcalc.sty
Package: intcalc 2019/12/15 v1.3 Expandable calculations with integers (HO)
)
(/usr/share/texlive/texmf-dist/tex/generic/etexcmds/etexcmds.sty
Package: etexcmds 2019/12/15 v1.7 Avoid name clashes with e-TeX commands (HO)
)
\Hy@SavedSpaceFactor=\count269
(/usr/share/texlive/texmf-dist/tex/latex/hyperref/puenc.def
File: puenc.def 2023-02-07 v7.00v Hyperref: PDF Unicode definition (HO)
Now handling font encoding PU ...
... no UTF-8 mapping file for font encoding PU
)
Package hyperref Info: Hyper figures OFF on input line 4177.
Package hyperref Info: Link nesting OFF on input line 4182.
Package hyperref Info: Hyper index ON on input line 4185.
Package hyperref Info: Plain pages OFF on input line 4192.
Package hyperref Info: Backreferencing OFF on input line 4197.
Package hyperref Info: Implicit mode ON; LaTeX internals redefined.
Package hyperref Info: Bookmarks ON on input line 4425.
\c@Hy@tempcnt=\count270
(/usr/share/texlive/texmf-dist/tex/latex/url/url.sty
\Urlmuskip=\muskip16
Package: url 2013/09/16 ver 3.4 Verb mode for urls, etc.
)
LaTeX Info: Redefining \url on input line 4763.
\XeTeXLinkMargin=\dimen165
(/usr/share/texlive/texmf-dist/tex/generic/bitset/bitset.sty
Package: bitset 2019/12/09 v1.3 Handle bit-vector datatype (HO)
(/usr/share/texlive/texmf-dist/tex/generic/bigintcalc/bigintcalc.sty
Package: bigintcalc 2019/12/15 v1.5 Expandable calculations on big integers (HO
)
))
\Fld@menulength=\count271
\Field@Width=\dimen166
\Fld@charsize=\dimen167
Package hyperref Info: Hyper figures OFF on input line 6042.
Package hyperref Info: Link nesting OFF on input line 6047.
Package hyperref Info: Hyper index ON on input line 6050.
Package hyperref Info: backreferencing OFF on input line 6057.
Package hyperref Info: Link coloring OFF on input line 6062.
Package hyperref Info: Link coloring with OCG OFF on input line 6067.
Package hyperref Info: PDF/A mode OFF on input line 6072.
(/usr/share/texlive/texmf-dist/tex/latex/base/atbegshi-ltx.sty
Package: atbegshi-ltx 2021/01/10 v1.0c Emulation of the original atbegshi
package with kernel methods
)
\Hy@abspage=\count272
\c@Item=\count273
\c@Hfootnote=\count274
)
Package hyperref Info: Driver (autodetected): hpdftex.
(/usr/share/texlive/texmf-dist/tex/latex/hyperref/hpdftex.def
File: hpdftex.def 2023-02-07 v7.00v Hyperref driver for pdfTeX
(/usr/share/texlive/texmf-dist/tex/latex/base/atveryend-ltx.sty
Package: atveryend-ltx 2020/08/19 v1.0a Emulation of the original atveryend pac
kage
with kernel methods
)
\Fld@listcount=\count275
\c@bookmark@seq@number=\count276
(/usr/share/texlive/texmf-dist/tex/latex/rerunfilecheck/rerunfilecheck.sty
Package: rerunfilecheck 2022-07-10 v1.10 Rerun checks for auxiliary files (HO)
(/usr/share/texlive/texmf-dist/tex/generic/uniquecounter/uniquecounter.sty
Package: uniquecounter 2019/12/15 v1.4 Provide unlimited unique counter (HO)
)
Package uniquecounter Info: New unique counter `rerunfilecheck' on input line 2
85.
)
\Hy@SectionHShift=\skip50
)
(/usr/share/texlive/texmf-dist/tex/latex/xcolor/xcolor.sty
Package: xcolor 2022/06/12 v2.14 LaTeX color extensions (UK)
(/usr/share/texlive/texmf-dist/tex/latex/graphics-cfg/color.cfg
File: color.cfg 2016/01/02 v1.6 sample color configuration
)
Package xcolor Info: Driver file: pdftex.def on input line 227.
(/usr/share/texlive/texmf-dist/tex/latex/graphics/mathcolor.ltx)
Package xcolor Info: Model `cmy' substituted by `cmy0' on input line 1353.
Package xcolor Info: Model `hsb' substituted by `rgb' on input line 1357.
Package xcolor Info: Model `RGB' extended on input line 1369.
Package xcolor Info: Model `HTML' substituted by `rgb' on input line 1371.
Package xcolor Info: Model `Hsb' substituted by `hsb' on input line 1372.
Package xcolor Info: Model `tHsb' substituted by `hsb' on input line 1373.
Package xcolor Info: Model `HSB' substituted by `hsb' on input line 1374.
Package xcolor Info: Model `Gray' substituted by `gray' on input line 1375.
Package xcolor Info: Model `wave' substituted by `hsb' on input line 1376.
)
(/usr/share/texlive/texmf-dist/tex/latex/amsmath/amsmath.sty
Package: amsmath 2022/04/08 v2.17n AMS math features
\@mathmargin=\skip51
For additional information on amsmath, use the `?' option.
(/usr/share/texlive/texmf-dist/tex/latex/amsmath/amstext.sty
Package: amstext 2021/08/26 v2.01 AMS text
(/usr/share/texlive/texmf-dist/tex/latex/amsmath/amsgen.sty
File: amsgen.sty 1999/11/30 v2.0 generic functions
\@emptytoks=\toks20
\ex@=\dimen168
))
(/usr/share/texlive/texmf-dist/tex/latex/amsmath/amsbsy.sty
Package: amsbsy 1999/11/29 v1.2d Bold Symbols
\pmbraise@=\dimen169
)
(/usr/share/texlive/texmf-dist/tex/latex/amsmath/amsopn.sty
Package: amsopn 2022/04/08 v2.04 operator names
)
\inf@bad=\count277
LaTeX Info: Redefining \frac on input line 234.
\uproot@=\count278
\leftroot@=\count279
LaTeX Info: Redefining \overline on input line 399.
LaTeX Info: Redefining \colon on input line 410.
\classnum@=\count280
\DOTSCASE@=\count281
LaTeX Info: Redefining \ldots on input line 496.
LaTeX Info: Redefining \dots on input line 499.
LaTeX Info: Redefining \cdots on input line 620.
\Mathstrutbox@=\box51
\strutbox@=\box52
LaTeX Info: Redefining \big on input line 722.
LaTeX Info: Redefining \Big on input line 723.
LaTeX Info: Redefining \bigg on input line 724.
LaTeX Info: Redefining \Bigg on input line 725.
\big@size=\dimen170
LaTeX Font Info: Redeclaring font encoding OML on input line 743.
LaTeX Font Info: Redeclaring font encoding OMS on input line 744.
\macc@depth=\count282
LaTeX Info: Redefining \bmod on input line 905.
LaTeX Info: Redefining \pmod on input line 910.
LaTeX Info: Redefining \smash on input line 940.
LaTeX Info: Redefining \relbar on input line 970.
LaTeX Info: Redefining \Relbar on input line 971.
\c@MaxMatrixCols=\count283
\dotsspace@=\muskip17
\c@parentequation=\count284
\dspbrk@lvl=\count285
\tag@help=\toks21
\row@=\count286
\column@=\count287
\maxfields@=\count288
\andhelp@=\toks22
\eqnshift@=\dimen171
\alignsep@=\dimen172
\tagshift@=\dimen173
\tagwidth@=\dimen174
\totwidth@=\dimen175
\lineht@=\dimen176
\@envbody=\toks23
\multlinegap=\skip52
\multlinetaggap=\skip53
\mathdisplay@stack=\toks24
LaTeX Info: Redefining \[ on input line 2953.
LaTeX Info: Redefining \] on input line 2954.
)
(/usr/share/texlive/texmf-dist/tex/latex/float/float.sty
Package: float 2001/11/08 v1.3d Float enhancements (AL)
\c@float@type=\count289
\float@exts=\toks25
\float@box=\box53
\@float@everytoks=\toks26
\@floatcapt=\box54
)
(/usr/share/texlive/texmf-dist/tex/latex/caption/caption.sty
Package: caption 2023/03/12 v3.6j Customizing captions (AR)
(/usr/share/texlive/texmf-dist/tex/latex/caption/caption3.sty
Package: caption3 2023/03/12 v2.4 caption3 kernel (AR)
\caption@tempdima=\dimen177
\captionmargin=\dimen178
\caption@leftmargin=\dimen179
\caption@rightmargin=\dimen180
\caption@width=\dimen181
\caption@indent=\dimen182
\caption@parindent=\dimen183
\caption@hangindent=\dimen184
Package caption Info: Standard document class detected.
)
\c@caption@flags=\count290
\c@continuedfloat=\count291
Package caption Info: float package is loaded.
Package caption Info: hyperref package is loaded.
)
(/usr/share/texlive/texmf-dist/tex/latex/caption/subcaption.sty
Package: subcaption 2023/02/19 v1.6 Sub-captions (AR)
Package caption Info: New subtype `subfigure' on input line 239.
\c@subfigure=\count292
Package caption Info: New subtype `subtable' on input line 239.
\c@subtable=\count293
)
(/usr/share/texlive/texmf-dist/tex/latex/tools/tabularx.sty
Package: tabularx 2020/01/15 v2.11c `tabularx' package (DPC)
(/usr/share/texlive/texmf-dist/tex/latex/tools/array.sty
Package: array 2022/09/04 v2.5g Tabular extension package (FMi)
\col@sep=\dimen185
\ar@mcellbox=\box55
\extrarowheight=\dimen186
\NC@list=\toks27
\extratabsurround=\skip54
\backup@length=\skip55
\ar@cellbox=\box56
)
\TX@col@width=\dimen187
\TX@old@table=\dimen188
\TX@old@col=\dimen189
\TX@target=\dimen190
\TX@delta=\dimen191
\TX@cols=\count294
\TX@ftn=\toks28
)
(/usr/share/texlive/texmf-dist/tex/latex/enumitem/enumitem.sty
Package: enumitem 2019/06/20 v3.9 Customized lists
\labelindent=\skip56
\enit@outerparindent=\dimen192
\enit@toks=\toks29
\enit@inbox=\box57
\enit@count@id=\count295
\enitdp@description=\count296
)
(/usr/share/texlive/texmf-dist/tex/latex/psnfss/pifont.sty
Package: pifont 2020/03/25 PSNFSS-v9.3 Pi font support (SPQR)
LaTeX Font Info: Trying to load font information for U+pzd on input line 63.
(/usr/share/texlive/texmf-dist/tex/latex/psnfss/upzd.fd
File: upzd.fd 2001/06/04 font definitions for U/pzd.
)
LaTeX Font Info: Trying to load font information for U+psy on input line 64.
(/usr/share/texlive/texmf-dist/tex/latex/psnfss/upsy.fd
File: upsy.fd 2001/06/04 font definitions for U/psy.
))
(/usr/share/texlive/texmf-dist/tex/latex/listings/listings.sty
\lst@mode=\count297
\lst@gtempboxa=\box58
\lst@token=\toks30
\lst@length=\count298
\lst@currlwidth=\dimen193
\lst@column=\count299
\lst@pos=\count300
\lst@lostspace=\dimen194
\lst@width=\dimen195
\lst@newlines=\count301
\lst@lineno=\count302
\lst@maxwidth=\dimen196
(/usr/share/texlive/texmf-dist/tex/latex/listings/lstmisc.sty
File: lstmisc.sty 2023/02/27 1.9 (Carsten Heinz)
\c@lstnumber=\count303
\lst@skipnumbers=\count304
\lst@framebox=\box59
)
(/usr/share/texlive/texmf-dist/tex/latex/listings/listings.cfg
File: listings.cfg 2023/02/27 1.9 listings configuration
))
Package: listings 2023/02/27 1.9 (Carsten Heinz)
(/usr/share/texlive/texmf-dist/tex/latex/pgf/frontendlayer/tikz.sty
(/usr/share/texlive/texmf-dist/tex/latex/pgf/basiclayer/pgf.sty
(/usr/share/texlive/texmf-dist/tex/latex/pgf/utilities/pgfrcs.sty
(/usr/share/texlive/texmf-dist/tex/generic/pgf/utilities/pgfutil-common.tex
\pgfutil@everybye=\toks31
\pgfutil@tempdima=\dimen197
\pgfutil@tempdimb=\dimen198
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/utilities/pgfutil-latex.def
\pgfutil@abb=\box60
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/utilities/pgfrcs.code.tex
(/usr/share/texlive/texmf-dist/tex/generic/pgf/pgf.revision.tex)
Package: pgfrcs 2023-01-15 v3.1.10 (3.1.10)
))
Package: pgf 2023-01-15 v3.1.10 (3.1.10)
(/usr/share/texlive/texmf-dist/tex/latex/pgf/basiclayer/pgfcore.sty
(/usr/share/texlive/texmf-dist/tex/latex/pgf/systemlayer/pgfsys.sty
(/usr/share/texlive/texmf-dist/tex/generic/pgf/systemlayer/pgfsys.code.tex
Package: pgfsys 2023-01-15 v3.1.10 (3.1.10)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex
\pgfkeys@pathtoks=\toks32
\pgfkeys@temptoks=\toks33
(/usr/share/texlive/texmf-dist/tex/generic/pgf/utilities/pgfkeyslibraryfiltered
.code.tex
\pgfkeys@tmptoks=\toks34
))
\pgf@x=\dimen199
\pgf@y=\dimen256
\pgf@xa=\dimen257
\pgf@ya=\dimen258
\pgf@xb=\dimen259
\pgf@yb=\dimen260
\pgf@xc=\dimen261
\pgf@yc=\dimen262
\pgf@xd=\dimen263
\pgf@yd=\dimen264
\w@pgf@writea=\write3
\r@pgf@reada=\read2
\c@pgf@counta=\count305
\c@pgf@countb=\count306
\c@pgf@countc=\count307
\c@pgf@countd=\count308
\t@pgf@toka=\toks35
\t@pgf@tokb=\toks36
\t@pgf@tokc=\toks37
\pgf@sys@id@count=\count309
(/usr/share/texlive/texmf-dist/tex/generic/pgf/systemlayer/pgf.cfg
File: pgf.cfg 2023-01-15 v3.1.10 (3.1.10)
)
Driver file for pgf: pgfsys-pdftex.def
(/usr/share/texlive/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-pdftex.def
File: pgfsys-pdftex.def 2023-01-15 v3.1.10 (3.1.10)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/systemlayer/pgfsys-common-pdf.de
f
File: pgfsys-common-pdf.def 2023-01-15 v3.1.10 (3.1.10)
)))
(/usr/share/texlive/texmf-dist/tex/generic/pgf/systemlayer/pgfsyssoftpath.code.
tex
File: pgfsyssoftpath.code.tex 2023-01-15 v3.1.10 (3.1.10)
\pgfsyssoftpath@smallbuffer@items=\count310
\pgfsyssoftpath@bigbuffer@items=\count311
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/systemlayer/pgfsysprotocol.code.
tex
File: pgfsysprotocol.code.tex 2023-01-15 v3.1.10 (3.1.10)
))
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcore.code.tex
Package: pgfcore 2023-01-15 v3.1.10 (3.1.10)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex
(/usr/share/texlive/texmf-dist/tex/generic/pgf/math/pgfmathutil.code.tex)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/math/pgfmathparser.code.tex
\pgfmath@dimen=\dimen265
\pgfmath@count=\count312
\pgfmath@box=\box61
\pgfmath@toks=\toks38
\pgfmath@stack@operand=\toks39
\pgfmath@stack@operation=\toks40
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.code.tex)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.basic.code
.tex)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.trigonomet
ric.code.tex)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.random.cod
e.tex)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.comparison
.code.tex)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.base.code.
tex)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.round.code
.tex)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.misc.code.
tex)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/math/pgfmathfunctions.integerari
thmetics.code.tex)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/math/pgfmathcalc.code.tex)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/math/pgfmathfloat.code.tex
\c@pgfmathroundto@lastzeros=\count313
))
(/usr/share/texlive/texmf-dist/tex/generic/pgf/math/pgfint.code.tex)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepoints.code.te
x
File: pgfcorepoints.code.tex 2023-01-15 v3.1.10 (3.1.10)
\pgf@picminx=\dimen266
\pgf@picmaxx=\dimen267
\pgf@picminy=\dimen268
\pgf@picmaxy=\dimen269
\pgf@pathminx=\dimen270
\pgf@pathmaxx=\dimen271
\pgf@pathminy=\dimen272
\pgf@pathmaxy=\dimen273
\pgf@xx=\dimen274
\pgf@xy=\dimen275
\pgf@yx=\dimen276
\pgf@yy=\dimen277
\pgf@zx=\dimen278
\pgf@zy=\dimen279
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathconstruct.
code.tex
File: pgfcorepathconstruct.code.tex 2023-01-15 v3.1.10 (3.1.10)
\pgf@path@lastx=\dimen280
\pgf@path@lasty=\dimen281
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathusage.code
.tex
File: pgfcorepathusage.code.tex 2023-01-15 v3.1.10 (3.1.10)
\pgf@shorten@end@additional=\dimen282
\pgf@shorten@start@additional=\dimen283
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcorescopes.code.te
x
File: pgfcorescopes.code.tex 2023-01-15 v3.1.10 (3.1.10)
\pgfpic=\box62
\pgf@hbox=\box63
\pgf@layerbox@main=\box64
\pgf@picture@serial@count=\count314
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcoregraphicstate.c
ode.tex
File: pgfcoregraphicstate.code.tex 2023-01-15 v3.1.10 (3.1.10)
\pgflinewidth=\dimen284
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransformation
s.code.tex
File: pgfcoretransformations.code.tex 2023-01-15 v3.1.10 (3.1.10)
\pgf@pt@x=\dimen285
\pgf@pt@y=\dimen286
\pgf@pt@temp=\dimen287
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcorequick.code.tex
File: pgfcorequick.code.tex 2023-01-15 v3.1.10 (3.1.10)
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreobjects.code.t
ex
File: pgfcoreobjects.code.tex 2023-01-15 v3.1.10 (3.1.10)
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepathprocessing
.code.tex
File: pgfcorepathprocessing.code.tex 2023-01-15 v3.1.10 (3.1.10)
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcorearrows.code.te
x
File: pgfcorearrows.code.tex 2023-01-15 v3.1.10 (3.1.10)
\pgfarrowsep=\dimen288
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreshade.code.tex
File: pgfcoreshade.code.tex 2023-01-15 v3.1.10 (3.1.10)
\pgf@max=\dimen289
\pgf@sys@shading@range@num=\count315
\pgf@shadingcount=\count316
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreimage.code.tex
File: pgfcoreimage.code.tex 2023-01-15 v3.1.10 (3.1.10)
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcoreexternal.code.
tex
File: pgfcoreexternal.code.tex 2023-01-15 v3.1.10 (3.1.10)
\pgfexternal@startupbox=\box65
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcorelayers.code.te
x
File: pgfcorelayers.code.tex 2023-01-15 v3.1.10 (3.1.10)
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcoretransparency.c
ode.tex
File: pgfcoretransparency.code.tex 2023-01-15 v3.1.10 (3.1.10)
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcorepatterns.code.
tex
File: pgfcorepatterns.code.tex 2023-01-15 v3.1.10 (3.1.10)
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/basiclayer/pgfcorerdf.code.tex
File: pgfcorerdf.code.tex 2023-01-15 v3.1.10 (3.1.10)
)))
(/usr/share/texlive/texmf-dist/tex/generic/pgf/modules/pgfmoduleshapes.code.tex
File: pgfmoduleshapes.code.tex 2023-01-15 v3.1.10 (3.1.10)
\pgfnodeparttextbox=\box66
) (/usr/share/texlive/texmf-dist/tex/generic/pgf/modules/pgfmoduleplot.code.tex
File: pgfmoduleplot.code.tex 2023-01-15 v3.1.10 (3.1.10)
)
(/usr/share/texlive/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-0-65
.sty
Package: pgfcomp-version-0-65 2023-01-15 v3.1.10 (3.1.10)
\pgf@nodesepstart=\dimen290
\pgf@nodesepend=\dimen291
)
(/usr/share/texlive/texmf-dist/tex/latex/pgf/compatibility/pgfcomp-version-1-18
.sty
Package: pgfcomp-version-1-18 2023-01-15 v3.1.10 (3.1.10)
)) (/usr/share/texlive/texmf-dist/tex/latex/pgf/utilities/pgffor.sty
(/usr/share/texlive/texmf-dist/tex/latex/pgf/utilities/pgfkeys.sty
(/usr/share/texlive/texmf-dist/tex/generic/pgf/utilities/pgfkeys.code.tex))
(/usr/share/texlive/texmf-dist/tex/latex/pgf/math/pgfmath.sty
(/usr/share/texlive/texmf-dist/tex/generic/pgf/math/pgfmath.code.tex))
(/usr/share/texlive/texmf-dist/tex/generic/pgf/utilities/pgffor.code.tex
Package: pgffor 2023-01-15 v3.1.10 (3.1.10)
\pgffor@iter=\dimen292
\pgffor@skip=\dimen293
\pgffor@stack=\toks41
\pgffor@toks=\toks42
))
(/usr/share/texlive/texmf-dist/tex/generic/pgf/frontendlayer/tikz/tikz.code.tex
Package: tikz 2023-01-15 v3.1.10 (3.1.10)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/libraries/pgflibraryplothandlers
.code.tex
File: pgflibraryplothandlers.code.tex 2023-01-15 v3.1.10 (3.1.10)
\pgf@plot@mark@count=\count317
\pgfplotmarksize=\dimen294
)
\tikz@lastx=\dimen295
\tikz@lasty=\dimen296
\tikz@lastxsaved=\dimen297
\tikz@lastysaved=\dimen298
\tikz@lastmovetox=\dimen299
\tikz@lastmovetoy=\dimen300
\tikzleveldistance=\dimen301
\tikzsiblingdistance=\dimen302
\tikz@figbox=\box67
\tikz@figbox@bg=\box68
\tikz@tempbox=\box69
\tikz@tempbox@bg=\box70
\tikztreelevel=\count318
\tikznumberofchildren=\count319
\tikznumberofcurrentchild=\count320
\tikz@fig@count=\count321
(/usr/share/texlive/texmf-dist/tex/generic/pgf/modules/pgfmodulematrix.code.tex
File: pgfmodulematrix.code.tex 2023-01-15 v3.1.10 (3.1.10)
\pgfmatrixcurrentrow=\count322
\pgfmatrixcurrentcolumn=\count323
\pgf@matrix@numberofcolumns=\count324
)
\tikz@expandcount=\count325
(/usr/share/texlive/texmf-dist/tex/generic/pgf/frontendlayer/tikz/libraries/tik
zlibrarytopaths.code.tex
File: tikzlibrarytopaths.code.tex 2023-01-15 v3.1.10 (3.1.10)
)))
(/usr/share/texlive/texmf-dist/tex/generic/pgf/libraries/pgflibraryarrows.meta.
code.tex
File: pgflibraryarrows.meta.code.tex 2023-01-15 v3.1.10 (3.1.10)
\pgfarrowinset=\dimen303
\pgfarrowlength=\dimen304
\pgfarrowwidth=\dimen305
\pgfarrowlinewidth=\dimen306
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/frontendlayer/tikz/libraries/tik
zlibrarypositioning.code.tex
File: tikzlibrarypositioning.code.tex 2023-01-15 v3.1.10 (3.1.10)
)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/frontendlayer/tikz/libraries/tik
zlibraryshapes.geometric.code.tex
File: tikzlibraryshapes.geometric.code.tex 2023-01-15 v3.1.10 (3.1.10)
(/usr/share/texlive/texmf-dist/tex/generic/pgf/libraries/shapes/pgflibraryshape
s.geometric.code.tex
File: pgflibraryshapes.geometric.code.tex 2023-01-15 v3.1.10 (3.1.10)
))
Package hyperref Info: Option `colorlinks' set `true' on input line 28.
LaTeX Font Info: Trying to load font information for T1+lmr on input line 53
.
(/usr/share/texlive/texmf-dist/tex/latex/lm/t1lmr.fd
File: t1lmr.fd 2015/05/01 v1.6.1 Font defs for Latin Modern
)
(/usr/share/texlive/texmf-dist/tex/latex/l3backend/l3backend-pdftex.def
File: l3backend-pdftex.def 2023-01-16 L3 backend support: PDF output (pdfTeX)
\l__color_backend_stack_int=\count326
\l__pdf_internal_box=\box71
)
(./main.aux)
\openout1 = `main.aux'.
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 53.
LaTeX Font Info: ... okay on input line 53.
LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 53.
LaTeX Font Info: ... okay on input line 53.
LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 53.
LaTeX Font Info: ... okay on input line 53.
LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 53.
LaTeX Font Info: ... okay on input line 53.
LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 53.
LaTeX Font Info: ... okay on input line 53.
LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 53.
LaTeX Font Info: ... okay on input line 53.
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 53.
LaTeX Font Info: ... okay on input line 53.
LaTeX Font Info: Checking defaults for PD1/pdf/m/n on input line 53.
LaTeX Font Info: ... okay on input line 53.
LaTeX Font Info: Checking defaults for PU/pdf/m/n on input line 53.
LaTeX Font Info: ... okay on input line 53.
*geometry* driver: auto-detecting
*geometry* detected driver: pdftex
*geometry* verbose mode - [ preamble ] result:
* driver: pdftex
* paper: a4paper
* layout: <same size as paper>
* layoutoffset:(h,v)=(0.0pt,0.0pt)
* modes:
* h-part:(L,W,R)=(72.26999pt, 452.9679pt, 72.26999pt)
* v-part:(T,H,B)=(72.26999pt, 700.50687pt, 72.26999pt)
* \paperwidth=597.50787pt
* \paperheight=845.04684pt
* \textwidth=452.9679pt
* \textheight=700.50687pt
* \oddsidemargin=0.0pt
* \evensidemargin=0.0pt
* \topmargin=-37.0pt
* \headheight=12.0pt
* \headsep=25.0pt
* \topskip=11.0pt
* \footskip=30.0pt
* \marginparwidth=50.0pt
* \marginparsep=10.0pt
* \columnsep=10.0pt
* \skip\footins=10.0pt plus 4.0pt minus 2.0pt
* \hoffset=0.0pt
* \voffset=0.0pt
* \mag=1000
* \@twocolumnfalse
* \@twosidefalse
* \@mparswitchfalse
* \@reversemarginfalse
* (1in=72.27pt=25.4mm, 1cm=28.453pt)
(/usr/share/texlive/texmf-dist/tex/context/base/mkii/supp-pdf.mkii
[Loading MPS to PDF converter (version 2006.09.02).]
\scratchcounter=\count327
\scratchdimen=\dimen307
\scratchbox=\box72
\nofMPsegments=\count328
\nofMParguments=\count329
\everyMPshowfont=\toks43
\MPscratchCnt=\count330
\MPscratchDim=\dimen308
\MPnumerator=\count331
\makeMPintoPDFobject=\count332
\everyMPtoPDFconversion=\toks44
) (/usr/share/texlive/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty
Package: epstopdf-base 2020-01-24 v2.11 Base part for package epstopdf
Package epstopdf-base Info: Redefining graphics rule for `.eps' on input line 4
85.
(/usr/share/texlive/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg
File: epstopdf-sys.cfg 2010/07/13 v1.3 Configuration of (r)epstopdf for TeX Liv
e
))
Package hyperref Info: Link coloring ON on input line 53.
(./main.out) (./main.out)
\@outlinefile=\write4
\openout4 = `main.out'.
Package caption Info: Begin \AtBeginDocument code.
Package caption Info: listings package is loaded.
Package caption Info: End \AtBeginDocument code.
\c@lstlisting=\count333
LaTeX Font Info: Trying to load font information for OT1+lmr on input line 5
5.
(/usr/share/texlive/texmf-dist/tex/latex/lm/ot1lmr.fd
File: ot1lmr.fd 2015/05/01 v1.6.1 Font defs for Latin Modern
)
LaTeX Font Info: Trying to load font information for OML+lmm on input line 5
5.
(/usr/share/texlive/texmf-dist/tex/latex/lm/omllmm.fd
File: omllmm.fd 2015/05/01 v1.6.1 Font defs for Latin Modern
)
LaTeX Font Info: Trying to load font information for OMS+lmsy on input line
55.
(/usr/share/texlive/texmf-dist/tex/latex/lm/omslmsy.fd
File: omslmsy.fd 2015/05/01 v1.6.1 Font defs for Latin Modern
)
LaTeX Font Info: Trying to load font information for OMX+lmex on input line
55.
(/usr/share/texlive/texmf-dist/tex/latex/lm/omxlmex.fd
File: omxlmex.fd 2015/05/01 v1.6.1 Font defs for Latin Modern
)
LaTeX Font Info: External font `lmex10' loaded for size
(Font) <12> on input line 55.
LaTeX Font Info: External font `lmex10' loaded for size
(Font) <8> on input line 55.
LaTeX Font Info: External font `lmex10' loaded for size
(Font) <6> on input line 55.
LaTeX Font Info: Trying to load font information for T1+lmtt on input line 5
5.
(/usr/share/texlive/texmf-dist/tex/latex/lm/t1lmtt.fd
File: t1lmtt.fd 2015/05/01 v1.6.1 Font defs for Latin Modern
)
LaTeX Font Info: External font `lmex10' loaded for size
(Font) <10> on input line 59.
LaTeX Font Info: External font `lmex10' loaded for size
(Font) <7> on input line 59.
LaTeX Font Info: External font `lmex10' loaded for size
(Font) <5> on input line 59.
LaTeX Font Info: External font `lmex10' loaded for size
(Font) <10.95> on input line 70.
[1
{/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}{/usr/share/texlive/texmf-di
st/fonts/enc/dvips/lm/lm-ec.enc}{/usr/share/texlive/texmf-dist/fonts/enc/dvips/
lm/lm-mathsy.enc}]
LaTeX Font Info: Trying to load font information for TS1+lmr on input line 8
9.
(/usr/share/texlive/texmf-dist/tex/latex/lm/ts1lmr.fd
File: ts1lmr.fd 2015/05/01 v1.6.1 Font defs for Latin Modern
) [2{/usr/share/texlive/texmf-dist/fonts/enc/dvips/lm/lm-ts1.enc}] [3] [4]
Package hyperref Info: bookmark level for unknown lstlisting defaults to 0 on i
nput line 255.
LaTeX Font Info: Font shape `T1/lmtt/bx/n' in size <10.95> not available
(Font) Font shape `T1/lmtt/b/n' tried instead on input line 289.
[5]
LaTeX Warning: `h' float specifier changed to `ht'.
[6{/usr/share/texlive/texmf-dist/fonts/enc/dvips/lm/lm-mathit.enc}{/usr/share/t
exlive/texmf-dist/fonts/enc/dvips/lm/lm-rm.enc}]
Underfull \hbox (badness 10000) in alignment at lines 442--442
[][][][][][][][][][][]
[]
LaTeX Warning: `h' float specifier changed to `ht'.
[7]
Underfull \hbox (badness 10000) in paragraph at lines 502--502
[]|\T1/lmr/m/n/10 Signed \T1/lmtt/m/n/10 exec_act \T1/lmr/m/n/10 records what a
gent
[]
Underfull \hbox (badness 10000) in paragraph at lines 502--502
[]|\T1/lmr/m/n/10 DAG en-ables post-mortem trac-ing;
[]
Underfull \hbox (badness 10000) in paragraph at lines 502--502
\T1/lmtt/m/n/10 inp_hash\T1/lmr/m/n/10 /\T1/lmtt/m/n/10 out_hash \T1/lmr/m/n/10
lo-cate data cor-
[]
Underfull \hbox (badness 2326) in paragraph at lines 502--502
[]|\T1/lmr/m/n/10 Timestamp-based ex-e-cu-tion tim-ing from
[]
LaTeX Warning: `h' float specifier changed to `ht'.
[8] [9]
Overfull \hbox (1.95187pt too wide) in paragraph at lines 572--573
[]\T1/lmr/bx/n/10.95 Supply chain trans-parency. \T1/lmr/m/n/10.95 SCITT (Sup-p
ly Chain In-tegrity, Trans-parency, and Trust) [[]]
[]
[10]
Overfull \hbox (2.66985pt too wide) in paragraph at lines 593--594
[]\T1/lmr/bx/n/10.95 Privacy-preserving ECTs\T1/lmr/m/n/10.95 : Se-lec-tive dis
-clo-sure of ex-e-cu-tion de-tails us-ing zero-knowledge
[]
Overfull \hbox (3.58261pt too wide) in paragraph at lines 597--598
\T1/lmr/m/n/10.95 The ECT spec-i-fi-ca-tion is avail-able as IETF Internet-Draf
t \T1/lmtt/m/n/10.95 draft-nennemann-wimse-ect-00 \T1/lmr/m/n/10.95 [[]].
[]
(./main.bbl [11]) [12] (./main.aux)
Package rerunfilecheck Info: File `main.out' has not changed.
(rerunfilecheck) Checksum: AF2FEAF11DA883504BCE89CC47A5CD09;5550.
)
Here is how much of TeX's memory you used:
25121 strings out of 477985
466749 string characters out of 5839380
2001388 words of memory out of 6000000
44749 multiletter control sequences out of 15000+600000
602532 words of font info for 88 fonts, out of 8000000 for 9000
14 hyphenation exceptions out of 8191
84i,12n,80p,1462b,1097s stack positions out of 10000i,1000n,20000p,200000b,200000s
</usr/share/texlive/texmf-dist/fonts/type1/public/lm/lmbx10.pfb></usr/share/t
exlive/texmf-dist/fonts/type1/public/lm/lmbx12.pfb></usr/share/texlive/texmf-di
st/fonts/type1/public/lm/lmbx7.pfb></usr/share/texlive/texmf-dist/fonts/type1/p
ublic/lm/lmbx8.pfb></usr/share/texlive/texmf-dist/fonts/type1/public/lm/lmbx9.p
fb></usr/share/texlive/texmf-dist/fonts/type1/public/lm/lmmi10.pfb></usr/share/
texlive/texmf-dist/fonts/type1/public/lm/lmr10.pfb></usr/share/texlive/texmf-di
st/fonts/type1/public/lm/lmr12.pfb></usr/share/texlive/texmf-dist/fonts/type1/p
ublic/lm/lmr6.pfb></usr/share/texlive/texmf-dist/fonts/type1/public/lm/lmr8.pfb
></usr/share/texlive/texmf-dist/fonts/type1/public/lm/lmr9.pfb></usr/share/texl
ive/texmf-dist/fonts/type1/public/lm/lmri10.pfb></usr/share/texlive/texmf-dist/
fonts/type1/public/lm/lmsy10.pfb></usr/share/texlive/texmf-dist/fonts/type1/pub
lic/lm/lmsy9.pfb></usr/share/texlive/texmf-dist/fonts/type1/public/lm/lmtk10.pf
b></usr/share/texlive/texmf-dist/fonts/type1/public/lm/lmtt10.pfb></usr/share/t
exlive/texmf-dist/fonts/type1/public/lm/lmtt12.pfb></usr/share/texlive/texmf-di
st/fonts/type1/public/lm/lmtt8.pfb></usr/share/texlive/texmf-dist/fonts/type1/p
ublic/lm/lmtt9.pfb></usr/share/texlive/texmf-dist/fonts/type1/urw/zapfding/uzdr
.pfb>
Output written on main.pdf (12 pages, 464732 bytes).
PDF statistics:
468 PDF objects out of 1000 (max. 8388607)
400 compressed objects within 4 object streams
135 named destinations out of 1000 (max. 500000)
261 words of extra memory for PDF output out of 10000 (max. 10000000)

View File

@@ -0,0 +1,31 @@
\BOOKMARK [1][-]{section.1}{\376\377\000I\000n\000t\000r\000o\000d\000u\000c\000t\000i\000o\000n}{}% 1
\BOOKMARK [1][-]{section.2}{\376\377\000B\000a\000c\000k\000g\000r\000o\000u\000n\000d}{}% 2
\BOOKMARK [2][-]{subsection.2.1}{\376\377\000I\000E\000T\000F\000\040\000A\000I\000\040\000A\000g\000e\000n\000t\000\040\000S\000t\000a\000n\000d\000a\000r\000d\000i\000z\000a\000t\000i\000o\000n}{section.2}% 3
\BOOKMARK [2][-]{subsection.2.2}{\376\377\000W\000I\000M\000S\000E\000\040\000A\000r\000c\000h\000i\000t\000e\000c\000t\000u\000r\000e}{section.2}% 4
\BOOKMARK [2][-]{subsection.2.3}{\376\377\000T\000h\000e\000\040\000I\000d\000e\000n\000t\000i\000t\000y\040\023\000A\000u\000t\000h\000o\000r\000i\000z\000a\000t\000i\000o\000n\040\023\000E\000x\000e\000c\000u\000t\000i\000o\000n\000\040\000S\000t\000a\000c\000k}{section.2}% 5
\BOOKMARK [1][-]{section.3}{\376\377\000L\000a\000n\000d\000s\000c\000a\000p\000e\000\040\000A\000n\000a\000l\000y\000s\000i\000s\000:\000\040\000M\000o\000t\000i\000v\000a\000t\000i\000n\000g\000\040\000E\000v\000i\000d\000e\000n\000c\000e}{}% 6
\BOOKMARK [2][-]{subsection.3.1}{\376\377\000C\000o\000r\000p\000u\000s\000\040\000O\000v\000e\000r\000v\000i\000e\000w}{section.3}% 7
\BOOKMARK [2][-]{subsection.3.2}{\376\377\000C\000a\000t\000e\000g\000o\000r\000y\000\040\000D\000i\000s\000t\000r\000i\000b\000u\000t\000i\000o\000n\000\040\000a\000n\000d\000\040\000t\000h\000e\000\040\000S\000a\000f\000e\000t\000y\000\040\000D\000e\000f\000i\000c\000i\000t}{section.3}% 8
\BOOKMARK [2][-]{subsection.3.3}{\376\377\000T\000h\000e\000\040\000O\000v\000e\000r\000l\000a\000p\000\040\000P\000r\000o\000b\000l\000e\000m}{section.3}% 9
\BOOKMARK [2][-]{subsection.3.4}{\376\377\000G\000a\000p\000s\000\040\000R\000e\000l\000e\000v\000a\000n\000t\000\040\000t\000o\000\040\000E\000x\000e\000c\000u\000t\000i\000o\000n\000\040\000T\000r\000a\000c\000k\000i\000n\000g}{section.3}% 10
\BOOKMARK [1][-]{section.4}{\376\377\000E\000x\000e\000c\000u\000t\000i\000o\000n\000\040\000C\000o\000n\000t\000e\000x\000t\000\040\000T\000o\000k\000e\000n\000\040\000S\000p\000e\000c\000i\000f\000i\000c\000a\000t\000i\000o\000n}{}% 11
\BOOKMARK [2][-]{subsection.4.1}{\376\377\000D\000e\000s\000i\000g\000n\000\040\000P\000r\000i\000n\000c\000i\000p\000l\000e\000s}{section.4}% 12
\BOOKMARK [2][-]{subsection.4.2}{\376\377\000T\000o\000k\000e\000n\000\040\000S\000t\000r\000u\000c\000t\000u\000r\000e}{section.4}% 13
\BOOKMARK [3][-]{subsubsection.4.2.1}{\376\377\000J\000O\000S\000E\000\040\000H\000e\000a\000d\000e\000r}{subsection.4.2}% 14
\BOOKMARK [3][-]{subsubsection.4.2.2}{\376\377\000C\000l\000a\000i\000m\000s}{subsection.4.2}% 15
\BOOKMARK [2][-]{subsection.4.3}{\376\377\000D\000A\000G\000\040\000C\000o\000n\000s\000t\000r\000u\000c\000t\000i\000o\000n\000\040\000a\000n\000d\000\040\000V\000a\000l\000i\000d\000a\000t\000i\000o\000n}{section.4}% 16
\BOOKMARK [2][-]{subsection.4.4}{\376\377\000V\000e\000r\000i\000f\000i\000c\000a\000t\000i\000o\000n\000\040\000P\000r\000o\000c\000e\000d\000u\000r\000e}{section.4}% 17
\BOOKMARK [2][-]{subsection.4.5}{\376\377\000H\000T\000T\000P\000\040\000T\000r\000a\000n\000s\000p\000o\000r\000t}{section.4}% 18
\BOOKMARK [2][-]{subsection.4.6}{\376\377\000A\000u\000d\000i\000t\000\040\000L\000e\000d\000g\000e\000r\000\040\000I\000n\000t\000e\000r\000f\000a\000c\000e}{section.4}% 19
\BOOKMARK [1][-]{section.5}{\376\377\000C\000o\000m\000p\000a\000r\000a\000t\000i\000v\000e\000\040\000A\000n\000a\000l\000y\000s\000i\000s\000\040\000A\000g\000a\000i\000n\000s\000t\000\040\000t\000h\000e\000\040\000L\000a\000n\000d\000s\000c\000a\000p\000e}{}% 20
\BOOKMARK [2][-]{subsection.5.1}{\376\377\000C\000o\000m\000p\000a\000r\000i\000s\000o\000n\000\040\000F\000r\000a\000m\000e\000w\000o\000r\000k}{section.5}% 21
\BOOKMARK [2][-]{subsection.5.2}{\376\377\000H\000e\000a\000d\000-\000t\000o\000-\000H\000e\000a\000d\000\040\000C\000o\000m\000p\000a\000r\000i\000s\000o\000n}{section.5}% 22
\BOOKMARK [2][-]{subsection.5.3}{\376\377\000U\000n\000i\000q\000u\000e\000n\000e\000s\000s\000\040\000Q\000u\000a\000n\000t\000i\000f\000i\000c\000a\000t\000i\000o\000n}{section.5}% 23
\BOOKMARK [1][-]{section.6}{\376\377\000G\000a\000p\000\040\000C\000o\000v\000e\000r\000a\000g\000e\000\040\000A\000n\000a\000l\000y\000s\000i\000s}{}% 24
\BOOKMARK [1][-]{section.7}{\376\377\000D\000i\000s\000c\000u\000s\000s\000i\000o\000n\000\040\000a\000n\000d\000\040\000L\000i\000m\000i\000t\000a\000t\000i\000o\000n\000s}{}% 25
\BOOKMARK [2][-]{subsection.7.1}{\376\377\000T\000h\000e\000\040\000S\000e\000l\000f\000-\000A\000s\000s\000e\000r\000t\000i\000o\000n\000\040\000L\000i\000m\000i\000t\000a\000t\000i\000o\000n}{section.7}% 26
\BOOKMARK [2][-]{subsection.7.2}{\376\377\000S\000c\000a\000l\000a\000b\000i\000l\000i\000t\000y\000\040\000C\000o\000n\000s\000i\000d\000e\000r\000a\000t\000i\000o\000n\000s}{section.7}% 27
\BOOKMARK [2][-]{subsection.7.3}{\376\377\000A\000d\000o\000p\000t\000i\000o\000n\000\040\000P\000a\000t\000h}{section.7}% 28
\BOOKMARK [2][-]{subsection.7.4}{\376\377\000L\000i\000m\000i\000t\000a\000t\000i\000o\000n\000s\000\040\000o\000f\000\040\000t\000h\000e\000\040\000L\000a\000n\000d\000s\000c\000a\000p\000e\000\040\000A\000n\000a\000l\000y\000s\000i\000s}{section.7}% 29
\BOOKMARK [1][-]{section.8}{\376\377\000R\000e\000l\000a\000t\000e\000d\000\040\000W\000o\000r\000k}{}% 30
\BOOKMARK [1][-]{section.9}{\376\377\000C\000o\000n\000c\000l\000u\000s\000i\000o\000n\000\040\000a\000n\000d\000\040\000F\000u\000t\000u\000r\000e\000\040\000W\000o\000r\000k}{}% 31

Binary file not shown.

View File

@@ -0,0 +1,610 @@
\documentclass[11pt,a4paper]{article}
% ── Packages ──────────────────────────────────────────────────────────────
\usepackage[utf8]{inputenc}
\usepackage[T1]{fontenc}
\usepackage{lmodern}
\usepackage[margin=1in]{geometry}
\usepackage{graphicx}
\usepackage{booktabs}
\usepackage{hyperref}
\usepackage{xcolor}
\usepackage{amsmath}
\usepackage{float}
\usepackage{caption}
\usepackage{subcaption}
\usepackage{tabularx}
\usepackage{enumitem}
\usepackage{pifont}
\usepackage{listings}
\usepackage{tikz}
\usetikzlibrary{arrows.meta, positioning, shapes.geometric}
\hypersetup{
colorlinks=true,
linkcolor=blue!60!black,
citecolor=blue!60!black,
urlcolor=blue!60!black,
}
\lstset{
basicstyle=\ttfamily\small,
frame=single,
breaklines=true,
columns=flexible,
keepspaces=true,
}
% ── Title ─────────────────────────────────────────────────────────────────
\title{%
\textbf{Execution Context Tokens for Distributed Agentic Workflows:\\
A Data-Driven Design Grounded in 260 IETF Internet-Drafts}%
}
\author{
Christian Nennemann\\
Independent Researcher\\
\texttt{ietf@nennemann.de}
}
\date{February 2026}
\begin{document}
\maketitle
% ── Abstract ──────────────────────────────────────────────────────────────
\begin{abstract}
The Internet Engineering Task Force (IETF) has seen 260 Internet-Drafts addressing AI agents and autonomous systems between June 2025 and February 2026---a 36$\times$ increase in monthly submissions over nine months. Yet a quantitative analysis of this corpus reveals a striking gap: while 98 drafts address agent \emph{identity}, 92 address agent-to-agent \emph{communication}, and 60 address \emph{authorization}, effectively zero proposals provide a standard format for recording what agents \emph{actually did}. We introduce Execution Context Tokens (ECTs), a JWT-based extension to the WIMSE (Workload Identity in Multi-System Environments) architecture that records task execution across distributed agentic workflows. Each ECT is a cryptographically signed record documenting a single task, with predecessor tasks linked through a directed acyclic graph (DAG). Using embedding-based similarity analysis, LLM-assisted multi-dimensional rating, and automated gap detection across the full 260-draft landscape, we demonstrate that ECTs address three identified gaps---agent behavior verification (critical), error recovery (critical), and data provenance (medium)---while maintaining low overlap (2/5) with existing proposals. A head-to-head comparison against eight competing drafts shows that ECTs are the only proposal combining DAG-based workflow modeling, cryptographic input/output integrity, and native WIMSE integration.
\end{abstract}
\noindent\textbf{Keywords:} execution context, agentic workflows, WIMSE, JWT, directed acyclic graph, IETF standardization, landscape analysis
% ══════════════════════════════════════════════════════════════════════════
% 1. INTRODUCTION
% ══════════════════════════════════════════════════════════════════════════
\section{Introduction}
The rapid deployment of autonomous AI agents---software systems that can independently plan, execute tasks, and collaborate with other agents---has created urgent demand for infrastructure standards. The IETF, as the primary venue for Internet protocol standardization, has responded with unprecedented speed: between June 2025 and February 2026, submissions grew from 2 AI-related Internet-Drafts per month to 72, a 36$\times$ increase in nine months.
However, this activity has not been evenly distributed. A quantitative survey of 260 drafts reveals that the community has focused heavily on three questions:
\begin{enumerate}[nosep]
\item \textbf{Who is this agent?} (Identity/authentication: 98 drafts)
\item \textbf{What may this agent do?} (Authorization/policy: 60 drafts)
\item \textbf{How do agents talk?} (Communication protocols: 92 drafts)
\end{enumerate}
\noindent A fourth, equally critical question remains effectively unanswered:
\begin{quote}
\textbf{What did this agent actually do?}
\end{quote}
\noindent Of 1,262 technical ideas extracted from the corpus, only 6 address error recovery in agentic workflows, 52 partially touch behavior verification, and zero provide hash-based data lineage tracking. This paper addresses this gap with two contributions:
\begin{itemize}[nosep]
\item \textbf{Execution Context Tokens (ECTs)}: A JWT-based extension to the WIMSE architecture~\cite{wimse-arch} that records task execution as cryptographically signed, DAG-linked tokens. ECTs answer the ``what did it do?'' question with verifiable execution records.
\item \textbf{Quantitative landscape positioning}: Using a purpose-built analysis pipeline (260 drafts, 33,670 pairwise similarity computations, 12 identified gaps), we demonstrate that ECTs occupy a genuinely novel niche---overlap score 2/5, composite quality 4.0/5---and are the only proposal simultaneously addressing all three execution-layer gaps.
\end{itemize}
\noindent The remainder of this paper is organized as follows. Section~\ref{sec:background} provides background on the WIMSE architecture and related standardization efforts. Section~\ref{sec:landscape} presents the quantitative landscape analysis that motivates ECTs. Section~\ref{sec:ect} describes the ECT specification. Section~\ref{sec:comparison} provides a head-to-head comparison against eight competing proposals. Section~\ref{sec:gaps} maps ECT mechanisms to the 12 identified landscape gaps. Section~\ref{sec:discussion} discusses limitations and adoption considerations. Sections~\ref{sec:related}--\ref{sec:conclusion} cover related work and conclusions.
% ══════════════════════════════════════════════════════════════════════════
% 2. BACKGROUND
% ══════════════════════════════════════════════════════════════════════════
\section{Background}
\label{sec:background}
\subsection{IETF AI Agent Standardization}
The IETF's AI-related work spans multiple working groups and areas. The WIMSE (Workload Identity in Multi-System Environments) working group focuses on cross-system identity for workloads and services. The SPICE (Secure Patterns for Internet CrEdentials) group addresses verifiable credentials. The RATS (Remote ATtestation procedureS) group develops attestation evidence formats. The OAuth working group has produced several agent-specific extensions for delegated authorization.
These groups collectively address the identity and authorization layers but leave execution accountability to individual implementations. No IETF working group currently has a charter covering execution record formats for agentic workflows.
\subsection{WIMSE Architecture}
The WIMSE architecture~\cite{wimse-arch} provides identity infrastructure for workloads operating across trust domains. Its core components are:
\begin{itemize}[nosep]
\item \textbf{Workload Identity Token (WIT)}: A JWT asserting the identity of a workload, typically using SPIFFE IDs~\cite{spiffe} as subject identifiers.
\item \textbf{Workload Proof Token (WPT)}: A proof-of-possession token binding a request to a specific WIT, preventing token theft.
\item \textbf{Trust Domains}: Administrative boundaries within which workload identities are issued and recognized. Cross-domain federation follows established patterns.
\end{itemize}
\noindent WIMSE answers ``who is this workload?'' and ``can it prove its identity?'' but does not answer ``what did it do?'' ECTs extend WIMSE to record execution context, reusing its signing infrastructure and trust model.
\subsection{The Identity--Authorization--Execution Stack}
We identify three layers of agent accountability:
\begin{enumerate}[nosep]
\item \textbf{Identity Layer}: Establishes \emph{who} the agent is (WIMSE WIT, X.509, DID).
\item \textbf{Authorization Layer}: Determines \emph{what} the agent may do (OAuth tokens, capability tokens, policy frameworks).
\item \textbf{Execution Layer}: Records \emph{what} the agent actually did (execution context, audit trails, provenance).
\end{enumerate}
\noindent The IETF landscape heavily invests in layers 1 and 2 (98 + 60 = 158 drafts) while layer 3 remains effectively vacant. This asymmetry means agents can be authenticated and authorized but their actual behavior cannot be independently audited---a significant gap for production deployments.
% ══════════════════════════════════════════════════════════════════════════
% 3. LANDSCAPE ANALYSIS
% ══════════════════════════════════════════════════════════════════════════
\section{Landscape Analysis: Motivating Evidence}
\label{sec:landscape}
To ground the ECT design in empirical evidence, we conducted a systematic analysis of 260 IETF Internet-Drafts related to AI agents, published between June 2025 and February 2026. The methodology, dataset, and analysis toolkit are described in a companion paper~\cite{landscape-survey} and released as open source.
\subsection{Corpus Overview}
Table~\ref{tab:corpus} summarizes the dataset.
\begin{table}[h]
\centering
\caption{Corpus summary statistics.}
\label{tab:corpus}
\begin{tabular}{lr}
\toprule
\textbf{Metric} & \textbf{Value} \\
\midrule
Internet-Drafts analyzed & 260 \\
Unique authors & 403 \\
Author--draft relationships & 742 \\
Technical ideas extracted & 1,262 \\
Semantic categories & 19 \\
Pairwise similarity pairs & 33,670 \\
Identified landscape gaps & 12 \\
Time span & Jun 2025 -- Feb 2026 \\
\bottomrule
\end{tabular}
\end{table}
\noindent Each draft was rated on five dimensions (novelty, maturity, overlap, momentum, relevance; scale 1--5) using LLM-assisted analysis (Anthropic Claude Sonnet~4), embedded using a local model (nomic-embed-text via Ollama), and processed for technical idea extraction.
\subsection{Category Distribution and the Safety Deficit}
LLM-assisted classification assigned each draft to one or more of 19 categories. Table~\ref{tab:tiers} organizes the top categories into three accountability tiers.
\begin{table}[h]
\centering
\caption{Category distribution organized by accountability tier.}
\label{tab:tiers}
\begin{tabular}{llrr}
\toprule
\textbf{Tier} & \textbf{Category} & \textbf{Drafts} & \textbf{Avg Score} \\
\midrule
Infrastructure & Data formats / interop & 102 & 3.3 \\
Infrastructure & A2A protocols & 92 & 3.4 \\
Infrastructure & Agent discovery / reg & 57 & 3.5 \\
\midrule
Authorization & Agent identity / auth & 98 & 3.4 \\
Authorization & Policy / governance & 60 & 3.3 \\
Authorization & Human-agent interaction & 22 & 3.3 \\
\midrule
Accountability & AI safety / alignment & 36 & 3.4 \\
Accountability & Autonomous netops & 60 & 3.3 \\
\bottomrule
\end{tabular}
\end{table}
\noindent The infrastructure and authorization tiers collectively account for 431 category assignments (noting that multi-assignment is possible). The accountability tier, despite including safety-critical concerns, accounts for only 96---a ratio of roughly \textbf{4:1}. Within the accountability tier, only 36 drafts address AI safety/alignment, the category most relevant to execution auditing.
\subsection{The Overlap Problem}
Pairwise cosine similarity analysis across 33,670 draft pairs reveals significant redundancy:
\begin{itemize}[nosep]
\item 56 pairs (0.2\%) exceed 0.90 similarity (near-duplicate)
\item 344 pairs (1.0\%) exceed 0.85 (highly similar)
\item 2,668 pairs (7.9\%) exceed 0.80 (significantly overlapping)
\end{itemize}
\noindent The redundancy concentrates in crowded areas. The OAuth-for-agents cluster contains 13 drafts proposing variations of delegated agent authorization. The agent-gateway cluster contains 10 drafts. Meanwhile, \textbf{zero} dedicated drafts exist for execution record formats prior to ECTs. The community is duplicating effort in well-explored spaces while leaving critical gaps unfilled.
\subsection{Gaps Relevant to Execution Tracking}
\label{sec:landscape-gaps}
Automated gap analysis identified 12 under-addressed areas (3 critical, 6 high, 3 medium severity). Three directly concern the execution layer:
\begin{table}[h]
\centering
\caption{Execution-layer gaps in the IETF landscape.}
\label{tab:exec-gaps}
\begin{tabularx}{\textwidth}{llcX}
\toprule
\textbf{Gap} & \textbf{Severity} & \textbf{Ideas\textsuperscript{a}} & \textbf{Problem} \\
\midrule
Behavior Verification & Critical & 52 & No mechanisms to verify agents behave per declared policies. 36 safety drafts vs 260 total. \\
Error Recovery & Critical & 6 & No standards for cascading failure recovery. Only 6 of 1,262 ideas address this. \\
Data Provenance & Medium & 0\textsuperscript{b} & No hash-based data lineage tracking despite 102 data format drafts. \\
\bottomrule
\multicolumn{4}{l}{\footnotesize\textsuperscript{a}Number of extracted ideas (of 1,262 total) that partially address the gap.} \\
\multicolumn{4}{l}{\footnotesize\textsuperscript{b}79 ideas mention ``data'' broadly, but none implement cryptographic lineage.} \\
\end{tabularx}
\end{table}
\noindent The error recovery gap is particularly stark: of 1,262 technical ideas extracted from the entire corpus, only \textbf{6} touch error handling in agentic workflows. The two proposals that do exist address the problem partially but lack a common execution record format for systematic post-mortem analysis.
% ══════════════════════════════════════════════════════════════════════════
% 4. ECT SPECIFICATION
% ══════════════════════════════════════════════════════════════════════════
\section{Execution Context Token Specification}
\label{sec:ect}
\subsection{Design Principles}
ECTs are guided by four principles:
\begin{enumerate}[nosep]
\item \textbf{Records, not permissions.} ECTs document what an agent did, not what it may do. They complement rather than replace authorization tokens.
\item \textbf{DAG, not chain.} Real-world workflows involve parallel execution and convergence (fan-out/fan-in). A directed acyclic graph captures this; a linear chain cannot.
\item \textbf{WIMSE-native.} ECTs reuse WIMSE's signing keys, identity model, and trust domains. No additional key infrastructure is required.
\item \textbf{Minimal mandatory claims.} Only three execution-specific claims are required (\texttt{jti}, \texttt{exec\_act}, \texttt{par}), keeping the base token compact.
\end{enumerate}
\subsection{Token Structure}
An ECT is a JWT~\cite{rfc7519} using JWS Compact Serialization~\cite{rfc7515}. It comprises a JOSE header, standard JWT claims, and execution-specific claims.
\subsubsection{JOSE Header}
\begin{lstlisting}[caption={ECT JOSE Header.}]
{
"alg": "ES256",
"typ": "wimse-exec+jwt",
"kid": "agent-a-key-id-123"
}
\end{lstlisting}
\noindent The \texttt{typ} parameter \texttt{wimse-exec+jwt} distinguishes ECTs from other JWTs. The \texttt{kid} references the agent's WIMSE public key, binding the ECT to the agent's verified identity.
\subsubsection{Claims}
\begin{lstlisting}[caption={Complete ECT payload example.}]
{
"iss": "spiffe://trust-domain.example/agent/payment-processor",
"aud": "spiffe://trust-domain.example/agent/compliance-check",
"iat": 1740600000,
"exp": 1740600900,
"jti": "f47ac10b-58cc-4372-a567-0e02b2c3d479",
"wid": "a1b2c3d4-e5f6-7890-abcd-ef1234567890",
"exec_act": "process_payment",
"par": ["c9d2e3f4-a5b6-7890-cdef-123456789012",
"d8e9f0a1-b2c3-4567-89ab-cdef01234567"],
"inp_hash": "base64url(SHA-256(input_data))",
"out_hash": "base64url(SHA-256(output_data))",
"ext": {
"com.example.amount_range": "1000-5000"
}
}
\end{lstlisting}
\noindent The execution-specific claims are:
\begin{itemize}[nosep]
\item \textbf{\texttt{exec\_act}}: A structured identifier for the action performed (e.g., \texttt{process\_payment}, \texttt{validate\_input}).
\item \textbf{\texttt{par}}: An array of parent task identifiers (\texttt{jti} values), forming the DAG edges. An empty array indicates a root task.
\item \textbf{\texttt{wid}}: Optional workflow identifier grouping related ECTs.
\item \textbf{\texttt{inp\_hash}} / \textbf{\texttt{out\_hash}}: SHA-256 hashes of input and output data, providing integrity without exposing content.
\item \textbf{\texttt{ext}}: Optional extension object (max 4,096 bytes, max 5 nesting levels) using reverse-domain notation.
\end{itemize}
\subsection{DAG Construction and Validation}
ECTs form a directed acyclic graph through the \texttt{par} claim. Each \texttt{par} entry references the \texttt{jti} of a predecessor task. Validation enforces five rules:
\begin{enumerate}[nosep]
\item \textbf{Uniqueness}: Each \texttt{jti} must be unique within the workflow scope (or globally if \texttt{wid} is absent).
\item \textbf{Parent existence}: All \texttt{par} entries must reference existing ECTs in the store.
\item \textbf{Temporal ordering}: Parent \texttt{iat} timestamps must not exceed child \texttt{iat} plus clock skew tolerance (recommended 30 seconds).
\item \textbf{Acyclicity}: Parent chains must not cycle back to the current task.
\item \textbf{Trust domain consistency}: Parents should belong to the same or federated trust domains.
\end{enumerate}
\noindent A maximum ancestor traversal limit of 10,000 nodes prevents denial-of-service via deep DAGs.
Figure~\ref{fig:dag} illustrates a five-task workflow with fan-out and fan-in.
\begin{figure}[h]
\centering
\begin{tikzpicture}[
node distance=1.5cm and 2.5cm,
task/.style={rectangle, draw, rounded corners, minimum width=2.2cm, minimum height=0.8cm, align=center, font=\footnotesize},
edge/.style={-{Stealth[length=3mm]}, thick}
]
\node[task, fill=blue!10] (t1) {Task A\\{\tiny\texttt{par:[]}}\\{\tiny fetch\_data}};
\node[task, fill=green!10, below left=of t1] (t2) {Task B\\{\tiny\texttt{par:[A]}}\\{\tiny analyze\_risk}};
\node[task, fill=green!10, below right=of t1] (t3) {Task C\\{\tiny\texttt{par:[A]}}\\{\tiny check\_credit}};
\node[task, fill=orange!10, below right=of t2] (t4) {Task D\\{\tiny\texttt{par:[B,C]}}\\{\tiny verify\_compliance}};
\node[task, fill=red!10, below=of t4] (t5) {Task E\\{\tiny\texttt{par:[D]}}\\{\tiny execute\_trade}};
\draw[edge] (t1) -- (t2);
\draw[edge] (t1) -- (t3);
\draw[edge] (t2) -- (t4);
\draw[edge] (t3) -- (t4);
\draw[edge] (t4) -- (t5);
\end{tikzpicture}
\caption{A five-task DAG representing a cross-organization financial workflow. Task~A (root) fetches data; Tasks~B and~C execute in parallel (fan-out); Task~D merges results (fan-in); Task~E performs the final action. Each task references its predecessors via the \texttt{par} claim.}
\label{fig:dag}
\end{figure}
\subsection{Verification Procedure}
ECT verification proceeds in 13 steps, grouped into four phases:
\begin{table}[h]
\centering
\caption{ECT verification procedure (13 steps in 4 phases).}
\label{tab:verify}
\small
\begin{tabularx}{\textwidth}{clX}
\toprule
\textbf{Step} & \textbf{Phase} & \textbf{Action} \\
\midrule
1 & Serialization & Parse JWS Compact Serialization (header.payload.signature) \\
2 & & Verify \texttt{typ} = \texttt{wimse-exec+jwt} \\
3 & & Verify \texttt{alg} $\in$ allowlist (must include ES256; reject \texttt{none}) \\
\midrule
4 & Identity & Verify \texttt{kid} references valid public key from agent's WIT \\
5 & Binding & Verify JWS signature per RFC~7515 \\
6 & & Confirm signing key not revoked \\
7 & & Verify \texttt{alg} matches WIT algorithm \\
8 & & Verify \texttt{iss} matches WIT \texttt{sub} claim \\
\midrule
9 & Temporal \& & Verify verifier's identity $\in$ \texttt{aud} \\
10 & Audience & Verify \texttt{exp} not passed \\
11 & & Verify \texttt{iat} $\leq$ now + 30s and $\geq$ now $-$ 15min \\
\midrule
12 & Structural & Verify \texttt{jti}, \texttt{exec\_act}, \texttt{par} present and well-formed \\
13 & & Perform DAG validation (Section~4.3) \\
\bottomrule
\end{tabularx}
\end{table}
\noindent Failed verification returns HTTP 403 (invalid ECT with valid WIT) or HTTP 401 (signature failure). The overall complexity is $O(1)$ per token except DAG traversal, which is $O(|V|+|E|)$ bounded by the 10,000-node limit.
\subsection{HTTP Transport}
ECTs travel via a new \texttt{Execution-Context} HTTP header alongside WIMSE identity:
\begin{lstlisting}[caption={HTTP request with WIMSE identity and ECT.}]
GET /api/compliance-check HTTP/1.1
Host: compliance-agent.example.com
Workload-Identity: eyJhbGci...WIT...
Execution-Context: eyJhbGci...ECT...
\end{lstlisting}
\noindent Multiple \texttt{Execution-Context} headers may appear when multiple parent tasks contribute context (fan-in). Receivers must individually verify each ECT and reject the request if any fails.
\subsection{Audit Ledger Interface}
An optional audit ledger provides immutable storage. Implementations must satisfy four requirements:
\begin{enumerate}[nosep]
\item \textbf{Append-only}: No modification or deletion after recording.
\item \textbf{Ordering}: Monotonically increasing sequence numbers.
\item \textbf{Lookup}: Efficient retrieval by \texttt{jti}.
\item \textbf{Integrity}: Hash chains or Merkle trees for tamper detection.
\end{enumerate}
\noindent Ledgers should be maintained independently of workflow agents to reduce collusion risk.
% ══════════════════════════════════════════════════════════════════════════
% 5. COMPARATIVE ANALYSIS
% ══════════════════════════════════════════════════════════════════════════
\section{Comparative Analysis Against the Landscape}
\label{sec:comparison}
\subsection{Comparison Framework}
We compare ECTs against eight proposals from the landscape along eight dimensions relevant to execution accountability:
\begin{enumerate}[nosep]
\item \textbf{Execution Recording}: Does it record what an agent did?
\item \textbf{DAG Support}: Can it represent parallel/fan-in workflows?
\item \textbf{I/O Integrity}: Does it protect input/output data integrity?
\item \textbf{Audit Trail}: Does it support immutable audit storage?
\item \textbf{WIMSE Integration}: Does it build on the WIMSE trust model?
\item \textbf{Authorization Scope}: Does it handle delegation/permission?
\item \textbf{Token Format}: Is it based on established standards (JWT/CWT)?
\item \textbf{Verification Depth}: How thorough is the verification procedure?
\end{enumerate}
\subsection{Head-to-Head Comparison}
Table~\ref{tab:comparison} presents the feature matrix. Composite scores are from our landscape analysis (1--5 scale, higher is better); overlap is the LLM-assessed redundancy with other drafts (lower is more unique).
\begin{table}[h]
\centering
\caption{Feature comparison: ECT vs.\ eight competing/complementary proposals. \ding{51} = full, $\sim$ = partial, \ding{55} = none.}
\label{tab:comparison}
\footnotesize
\renewcommand{\arraystretch}{1.15}
\begin{tabularx}{\textwidth}{l c c c c c c c c c c}
\toprule
\textbf{Proposal} & \textbf{Score} & \textbf{Ovlp} & \rotatebox{70}{\textbf{Exec Record}} & \rotatebox{70}{\textbf{DAG}} & \rotatebox{70}{\textbf{I/O Hash}} & \rotatebox{70}{\textbf{Audit}} & \rotatebox{70}{\textbf{WIMSE}} & \rotatebox{70}{\textbf{AuthZ}} & \rotatebox{70}{\textbf{JWT/CWT}} & \rotatebox{70}{\textbf{Verif.\ Depth}} \\
\midrule
\textbf{ECT (this work)} & 4.0 & 2 & \ding{51} & \ding{51} & \ding{51} & \ding{51} & \ding{51} & \ding{55} & \ding{51} & 13 steps \\
DAAP v2~\cite{daap-v2} & 4.8 & 1 & $\sim$ & \ding{55} & \ding{55} & \ding{51} & \ding{55} & \ding{51} & \ding{51} & Broad \\
STAMP~\cite{stamp} & 4.6 & 1 & \ding{55} & \ding{55} & $\sim$ & \ding{51} & \ding{55} & \ding{51} & \ding{51} & 8 steps \\
Agentic JWT~\cite{agentic-jwt} & 4.5 & 2 & \ding{55} & $\sim$ & \ding{55} & \ding{55} & \ding{55} & \ding{51} & \ding{51} & 6 steps \\
Verif.\ Conv.~\cite{verif-conv} & 4.5 & 2 & $\sim$ & \ding{55} & $\sim$ & \ding{51} & \ding{55} & \ding{55} & COSE & Schema \\
Trans.\ Attest.~\cite{trans-att} & 4.3 & 2 & \ding{55} & \ding{55} & \ding{55} & \ding{55} & \ding{51} & \ding{55} & \ding{51} & Env.\ only \\
Txn Tokens~\cite{txn-tokens} & 4.2 & 3 & \ding{55} & \ding{55} & \ding{55} & \ding{55} & \ding{55} & \ding{51} & \ding{51} & Linear \\
Actor Chain~\cite{actor-chain} & 4.1 & 2 & \ding{55} & \ding{55} & \ding{55} & $\sim$ & \ding{55} & \ding{51} & \ding{51} & Linear \\
HJS~\cite{hjs} & 3.5 & 1 & \ding{51} & \ding{55} & \ding{55} & \ding{51} & \ding{55} & \ding{55} & Custom & Blockchain \\
\bottomrule
\end{tabularx}
\end{table}
\noindent Key observations:
\textbf{ECT is the only proposal combining execution recording with DAG support.} The Actor Chain~\cite{actor-chain} and Transaction Tokens~\cite{txn-tokens} propagate linear context but cannot represent fan-in workflows where multiple parent tasks converge. The ECT DAG model is strictly more expressive.
\textbf{No other proposal provides cryptographic I/O integrity.} ECTs' \texttt{inp\_hash} and \texttt{out\_hash} claims create a verifiable data lineage chain. STAMP~\cite{stamp} includes message-level proofs but focuses on delegation authorization, not execution data.
\textbf{DAAP v2~\cite{daap-v2} is the most comprehensive competitor.} Scoring 4.8, it covers authentication, behavioral monitoring, and remote shutdown---a broader scope than ECTs. However, it does not define a structured execution record format or support DAG workflow modeling. ECTs are complementary: DAAP could use ECTs as its execution record layer.
\textbf{Transitive Attestation~\cite{trans-att} is a natural WIMSE sibling.} It binds identities to execution environments (TEEs). Combined with ECTs, the WIMSE stack would provide a complete accountability chain: \emph{who} (WIT), \emph{where} (transitive attestation), \emph{what} (ECT).
\textbf{HJS~\cite{hjs} shares ECT's goals but uses a heavier trust model.} Blockchain-anchored timestamps provide decentralized accountability but introduce latency and infrastructure requirements that ECTs avoid through standard JWT infrastructure.
\subsection{Uniqueness Quantification}
To quantify ECT's positioning beyond subjective comparison, we use embedding-based similarity from the landscape analysis:
\begin{itemize}[nosep]
\item \textbf{Maximum pairwise similarity}: 0.836 (with \texttt{draft-nederveld-adl}, an agent definition language---a different problem domain).
\item \textbf{Overlap rating}: 2/5 (low---among the most unique 25\% of all 260 drafts).
\item \textbf{Cluster membership}: ECT does not belong to any of the high-similarity clusters identified at the 0.85 threshold.
\item \textbf{Composite score}: 4.0/5, placing ECT in the top 20\% of the corpus.
\end{itemize}
\noindent These metrics confirm that ECTs occupy a genuinely novel niche rather than duplicating existing work.
% ══════════════════════════════════════════════════════════════════════════
% 6. GAP COVERAGE ANALYSIS
% ══════════════════════════════════════════════════════════════════════════
\section{Gap Coverage Analysis}
\label{sec:gaps}
We map ECT mechanisms to each of the 12 identified landscape gaps. Table~\ref{tab:all-gaps} provides the full matrix.
\begin{table}[h]
\centering
\caption{ECT coverage of the 12 identified landscape gaps.}
\label{tab:all-gaps}
\small
\begin{tabularx}{\textwidth}{llccX}
\toprule
\textbf{Gap} & \textbf{Sev.} & \textbf{Exist.\textsuperscript{a}} & \textbf{ECT} & \textbf{ECT Mechanism} \\
\midrule
Agent Behavior Verification & Crit. & 52 & \ding{51} & Signed \texttt{exec\_act} records what agent claimed to do \\
Agent Error Recovery & Crit. & 6 & \ding{51} & DAG enables post-mortem tracing; \texttt{inp\_hash}/\texttt{out\_hash} locate data corruption \\
Agent Resource Mgmt & Crit. & 117 & \ding{55} & --- \\
Cross-Protocol Translation & High & 0 & \ding{55} & --- \\
Agent Lifecycle Mgmt & High & 90 & \ding{55} & --- \\
Multi-Agent Consensus & High & 5 & \ding{55} & --- \\
Human Override & High & 4 & \ding{55} & --- \\
Cross-Domain Security & High & 10 & $\sim$ & DAG validation rule~5 (trust domain consistency) \\
Dynamic Trust & High & 5 & $\sim$ & Execution history enables reputation assessment \\
Agent Performance Mon. & Med. & 26 & $\sim$ & Timestamp-based execution timing from \texttt{iat} of parent/child \\
Agent Explainability & Med. & 5 & \ding{55} & --- \\
Agent Data Provenance & Med. & 0 & \ding{51} & \texttt{inp\_hash}/\texttt{out\_hash} chains create verifiable data lineage \\
\bottomrule
\multicolumn{5}{l}{\footnotesize\textsuperscript{a}Number of existing ideas (of 1,262) that partially address the gap.} \\
\end{tabularx}
\end{table}
\noindent ECTs fully address 3 gaps and partially address 3 more. Notably, ECTs are the \textbf{only single proposal in the 260-draft landscape that simultaneously addresses all three execution-layer gaps} (behavior verification, error recovery, data provenance). No other draft combines signed execution records, DAG-based workflow modeling, and cryptographic data lineage.
The error recovery coverage is particularly significant: with only 6 of 1,262 ideas touching this topic, the existing landscape provides essentially no support for debugging failed multi-agent workflows. ECT DAGs directly enable the kind of ``execution replay'' analysis that production deployments require.
% ══════════════════════════════════════════════════════════════════════════
% 7. DISCUSSION
% ══════════════════════════════════════════════════════════════════════════
\section{Discussion and Limitations}
\label{sec:discussion}
\subsection{The Self-Assertion Limitation}
ECTs are fundamentally self-asserted: an agent creates its own execution record. A compromised or malicious agent can claim to have performed actions it did not, or omit actions it did perform. This is the most significant limitation of the design.
Mitigations include:
\begin{itemize}[nosep]
\item \textbf{Independent audit ledgers}: Maintained separately from workflow agents, enabling cross-verification of ECT sequences.
\item \textbf{Multi-replica comparison}: Multiple observers independently record ECTs and flag discrepancies.
\item \textbf{TEE integration}: Combining ECTs with transitive attestation~\cite{trans-att} to verify the execution environment. If the agent runs in a Trusted Execution Environment, the ECT's credibility increases significantly.
\item \textbf{Input/output hash verification}: While agents can falsify \texttt{exec\_act}, the \texttt{inp\_hash} and \texttt{out\_hash} claims can be independently verified by recipients who possess the actual data.
\end{itemize}
\subsection{Scalability Considerations}
Large-scale workflows may generate thousands of ECTs. The 10,000-node traversal limit constrains verification cost but may prove insufficient for long-running industrial workflows. Practical deployments may require:
\begin{itemize}[nosep]
\item \textbf{Checkpoint ECTs}: Periodic summarization of sub-DAGs into single checkpoint tokens, resetting traversal depth.
\item \textbf{Lazy verification}: Verifying only the immediate parents during normal operation, with full DAG traversal reserved for audit and debugging.
\item \textbf{Ledger-assisted verification}: Offloading DAG validation to the audit ledger, which maintains an indexed view of the complete workflow graph.
\end{itemize}
\subsection{Adoption Path}
ECTs are designed for incremental adoption:
\begin{enumerate}[nosep]
\item Agents can emit ECTs even if not all recipients verify them (the header is simply ignored by unaware systems).
\item The JWT format leverages existing libraries and tooling in every major programming language.
\item Integration with WIMSE requires only that the agent already possesses a WIT---no additional key infrastructure.
\item The single new HTTP header (\texttt{Execution-Context}) requires no changes to request routing or load balancing.
\end{enumerate}
\subsection{Limitations of the Landscape Analysis}
The quantitative evidence supporting ECTs inherits limitations from the analysis methodology:
\begin{itemize}[nosep]
\item \textbf{Keyword selection}: Six seed keywords may miss relevant drafts using different terminology.
\item \textbf{Single-LLM assessment}: Claude Sonnet~4 may have systematic biases in its ratings.
\item \textbf{Snapshot}: The analysis captures February 2026; the landscape evolves continuously.
\item \textbf{Disambiguation}: Author affiliations may be inconsistent (e.g., ``Huawei'' vs.\ ``Huawei Technologies'' are counted separately).
\end{itemize}
% ══════════════════════════════════════════════════════════════════════════
% 8. RELATED WORK
% ══════════════════════════════════════════════════════════════════════════
\section{Related Work}
\label{sec:related}
\textbf{Distributed tracing.} OpenTelemetry~\cite{opentelemetry} provides observability for microservice architectures with trace/span hierarchies. However, spans are unsigned and designed for monitoring, not accountability. ECTs provide cryptographic integrity and are designed for audit, not debugging (though they enable both).
\textbf{Provenance standards.} The W3C PROV data model~\cite{w3c-prov} provides a semantic framework for provenance tracking. PROV is comprehensive but heavyweight---ECTs provide a runtime-embeddable JWT format suitable for HTTP request flows rather than offline provenance databases.
\textbf{Supply chain transparency.} SCITT (Supply Chain Integrity, Transparency, and Trust)~\cite{scitt} defines transparent ledgers for signed statements about supply chain artifacts. ECT audit ledgers share design principles but target runtime execution rather than build-time artifacts. ECTs could correlate with SCITT Signed Statements for end-to-end accountability.
\textbf{Blockchain-based accountability.} Various proposals use blockchain for agent accountability (e.g., HJS~\cite{hjs}). ECTs deliberately avoid blockchain dependency to minimize latency and infrastructure requirements, using optional append-only ledgers instead.
% ══════════════════════════════════════════════════════════════════════════
% 9. CONCLUSION
% ══════════════════════════════════════════════════════════════════════════
\section{Conclusion and Future Work}
\label{sec:conclusion}
We have presented Execution Context Tokens (ECTs), a JWT-based extension to the WIMSE architecture for recording task execution in distributed agentic workflows. By analyzing 260 IETF Internet-Drafts using embedding similarity, LLM-assisted rating, and automated gap detection, we demonstrated that the execution accountability layer is the most under-served area in the current standardization landscape.
ECTs address this gap with a design that is both technically sound (DAG-based workflow modeling, cryptographic I/O integrity, 13-step verification) and practically deployable (JWT format, single HTTP header, incremental adoption). A head-to-head comparison against eight competing proposals confirms that ECTs are the only specification combining execution recording, DAG support, and WIMSE-native integration.
\textbf{Future work} includes:
\begin{enumerate}[nosep]
\item \textbf{Reference implementation}: An open-source library for ECT creation, verification, and DAG visualization.
\item \textbf{Formal verification}: Applying ProVerif or Tamarin to the ECT security model.
\item \textbf{Integration testing}: Deploying ECTs alongside WIMSE WIT/WPT and transitive attestation in a multi-agent testbed to validate the ``WIMSE trinity'' concept.
\item \textbf{Privacy-preserving ECTs}: Selective disclosure of execution details using zero-knowledge proofs or redactable signatures.
\item \textbf{Longitudinal tracking}: Monitoring the landscape as it evolves and assessing whether ECTs catalyze additional execution-layer proposals.
\end{enumerate}
\noindent The ECT specification is available as IETF Internet-Draft \texttt{draft-nennemann-wimse-ect-00}~\cite{ect-draft}. The landscape analysis toolkit and dataset are released as open source.\footnote{Repository: \url{https://github.com/TODO/ietf-draft-analyzer}}
% ── Acknowledgments ──────────────────────────────────────────────────────
\section*{Acknowledgments}
The landscape analysis was performed using Anthropic Claude (Sonnet 4) for rating and idea extraction, and Ollama with nomic-embed-text for embedding generation. The author thanks the IETF community for maintaining the open Datatracker API and the WIMSE working group for providing the identity foundation on which ECTs build.
% ── References ───────────────────────────────────────────────────────────
\bibliographystyle{plain}
\bibliography{references}
\end{document}

View File

@@ -0,0 +1,207 @@
% ── IETF RFCs and Standards ──────────────────────────────────────────────
@misc{rfc7519,
author = {M. Jones and J. Bradley and N. Sakimura},
title = {{JSON Web Token (JWT)}},
howpublished = {RFC 7519},
year = {2015},
url = {https://www.rfc-editor.org/rfc/rfc7519},
}
@misc{rfc7515,
author = {M. Jones and J. Bradley and N. Sakimura},
title = {{JSON Web Signature (JWS)}},
howpublished = {RFC 7515},
year = {2015},
url = {https://www.rfc-editor.org/rfc/rfc7515},
}
@misc{rfc2026,
author = {S. Bradner},
title = {{The Internet Standards Process -- Revision 3}},
howpublished = {RFC 2026},
year = {1996},
url = {https://www.rfc-editor.org/rfc/rfc2026},
}
@misc{rfc8693,
author = {M. Jones and A. Nadalin and B. Campbell and J. Bradley and C. Mortimore},
title = {{OAuth 2.0 Token Exchange}},
howpublished = {RFC 8693},
year = {2020},
url = {https://www.rfc-editor.org/rfc/rfc8693},
}
% ── WIMSE Architecture ──────────────────────────────────────────────────
@misc{wimse-arch,
author = {{WIMSE Working Group}},
title = {{Workload Identity in Multi System Environments (WIMSE) Architecture}},
howpublished = {Internet-Draft},
year = {2025},
url = {https://datatracker.ietf.org/wg/wimse/about/},
}
@misc{spiffe,
author = {{SPIFFE Project}},
title = {{SPIFFE: Secure Production Identity Framework for Everyone}},
howpublished = {CNCF Project},
year = {2024},
url = {https://spiffe.io},
}
% ── The ECT Draft ───────────────────────────────────────────────────────
@misc{ect-draft,
author = {Christian Nennemann},
title = {{Execution Context Tokens for Distributed Agentic Workflows}},
howpublished = {Internet-Draft draft-nennemann-wimse-ect-00},
year = {2026},
month = feb,
url = {https://datatracker.ietf.org/doc/draft-nennemann-wimse-ect/},
}
% ── Competing/Complementary IETF Drafts ─────────────────────────────────
@misc{daap-v2,
author = {Aylward, Jonathan},
title = {{Distributed AI Accountability Protocol (DAAP) Version 2.0}},
howpublished = {Internet-Draft draft-aylward-daap-v2},
year = {2026},
url = {https://datatracker.ietf.org/doc/draft-aylward-daap-v2/},
}
@misc{stamp,
author = {Guy, Bary},
title = {{Secure Task-bound Agent Message Proof (STAMP) Protocol}},
howpublished = {Internet-Draft draft-guy-bary-stamp-protocol},
year = {2025},
url = {https://datatracker.ietf.org/doc/draft-guy-bary-stamp-protocol/},
}
@misc{agentic-jwt,
author = {Goswami, Anirudh},
title = {{Secure Intent Protocol: JWT Compatible Agentic Identity and Workflow Management}},
howpublished = {Internet-Draft draft-goswami-agentic-jwt},
year = {2025},
url = {https://datatracker.ietf.org/doc/draft-goswami-agentic-jwt/},
}
@misc{verif-conv,
author = {Birkholz, Henk},
title = {{Verifiable Agent Conversation Records}},
howpublished = {Internet-Draft draft-birkholz-verifiable-agent-conversations},
year = {2025},
url = {https://datatracker.ietf.org/doc/draft-birkholz-verifiable-agent-conversations/},
}
@misc{trans-att,
author = {{MW et al.}},
title = {{Transitive Attestation for Sovereign Workloads: A WIMSE Profile}},
howpublished = {Internet-Draft draft-mw-wimse-transitive-attestation},
year = {2025},
url = {https://datatracker.ietf.org/doc/draft-mw-wimse-transitive-attestation/},
}
@misc{txn-tokens,
author = {{OAuth Working Group}},
title = {{Transaction Tokens For Agents}},
howpublished = {Internet-Draft draft-oauth-transaction-tokens-for-agents},
year = {2025},
url = {https://datatracker.ietf.org/doc/draft-oauth-transaction-tokens-for-agents/},
}
@misc{actor-chain,
author = {{MW et al.}},
title = {{Cryptographically Verifiable Actor Chain for OAuth 2.0 Token Exchange}},
howpublished = {Internet-Draft draft-mw-spice-actor-chain},
year = {2025},
url = {https://datatracker.ietf.org/doc/draft-mw-spice-actor-chain/},
}
@misc{hjs,
author = {Wang, et al.},
title = {{HJS: An Accountability Layer for AI Agents}},
howpublished = {Internet-Draft draft-wang-hjs-accountability},
year = {2025},
url = {https://datatracker.ietf.org/doc/draft-wang-hjs-accountability/},
}
% ── Other Referenced Drafts ──────────────────────────────────────────────
@misc{agent-recovery,
author = {Yue, et al.},
title = {{Task-Oriented Multi-Agent Recovery Framework for High-Reliability in Converged Mobile Networks}},
howpublished = {Internet-Draft draft-yue-anima-agent-recovery-networks},
year = {2025},
url = {https://datatracker.ietf.org/doc/draft-yue-anima-agent-recovery-networks/},
}
@misc{agents-policy,
author = {Srijal},
title = {{AGENTS.TXT: Strict Policy File for Automated Clients}},
howpublished = {Internet-Draft draft-srijal-agents-policy},
year = {2025},
url = {https://datatracker.ietf.org/doc/draft-srijal-agents-policy/},
}
% ── Companion Paper ─────────────────────────────────────────────────────
@misc{landscape-survey,
author = {Nennemann, Christian},
title = {{The AI Agent Standardization Wave: A Quantitative Analysis of 260 IETF Internet-Drafts on Autonomous Agents and Artificial Intelligence}},
howpublished = {arXiv preprint},
year = {2026},
note = {Companion landscape survey paper},
}
% ── Related Work ────────────────────────────────────────────────────────
@misc{opentelemetry,
author = {{OpenTelemetry Project}},
title = {{OpenTelemetry Specification}},
howpublished = {CNCF Project},
year = {2024},
url = {https://opentelemetry.io},
}
@misc{w3c-prov,
author = {Luc Moreau and Paolo Missier},
title = {{PROV-DM: The PROV Data Model}},
howpublished = {W3C Recommendation},
year = {2013},
url = {https://www.w3.org/TR/prov-dm/},
}
@misc{scitt,
author = {{IETF SCITT Working Group}},
title = {{Supply Chain Integrity, Transparency, and Trust (SCITT)}},
howpublished = {Internet-Draft},
year = {2024},
url = {https://datatracker.ietf.org/wg/scitt/about/},
}
@misc{a2a-protocol,
author = {{Google}},
title = {{Agent-to-Agent (A2A) Protocol Specification}},
howpublished = {Technical Report},
year = {2025},
url = {https://github.com/google/A2A},
}
@misc{mcp-protocol,
author = {{Anthropic}},
title = {{Model Context Protocol (MCP) Specification}},
howpublished = {Technical Report},
year = {2025},
url = {https://modelcontextprotocol.io},
}
% ── Academic References ─────────────────────────────────────────────────
@inproceedings{brown2020,
author = {Brown, Tom and Mann, Benjamin and Ryder, Nick and others},
title = {{Language Models are Few-Shot Learners}},
booktitle = {Advances in Neural Information Processing Systems},
year = {2020},
}