Add ASCII art figures to all 6 generated Internet-Drafts
Each draft gets 2 illustrative figures: - ABVP: architecture components + verification workflow - ATD: example DAG structure + execution state transitions - HITL: primitive framework overview + approval workflow sequence - AEM/PPALP: federated learning architecture + aggregation flow - RARP: cross-domain architecture + two-phase rollback protocol - APAE: layered architecture + cross-domain provenance tracking Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This commit is contained in:
@@ -370,6 +370,28 @@ Table of Contents
|
||||
to implement provenance assurance incrementally without disrupting
|
||||
existing agent ecosystems.
|
||||
|
||||
+------------------------------------------------+
|
||||
| Provenance Query Layer |
|
||||
| (cross-domain search, history retrieval) |
|
||||
+------------------------------------------------+
|
||||
| Cross-Domain Tracking Layer |
|
||||
| (gateway coordination, chain linking) |
|
||||
+------------------------------------------------+
|
||||
| Operational Audit Layer |
|
||||
| (action logging, decision trails) |
|
||||
+------------------------------------------------+
|
||||
| Capability Verification Layer |
|
||||
| (skill attestation, scope validation) |
|
||||
+------------------------------------------------+
|
||||
| Identity Attestation Layer |
|
||||
| (agent ID, key management, TEE binding) |
|
||||
+------------------------------------------------+
|
||||
| Trust Infrastructure Layer |
|
||||
| (PKI, trust anchors, revocation) |
|
||||
+------------------------------------------------+
|
||||
|
||||
Figure 1: APAE Layered Architecture
|
||||
|
||||
The Identity Attestation Layer serves as the foundational trust
|
||||
anchor for the APAE framework, establishing and maintaining
|
||||
verifiable agent identities throughout their operational
|
||||
@@ -683,6 +705,19 @@ Table of Contents
|
||||
established protocols and standards while extending them with
|
||||
agent-specific provenance metadata and verification mechanisms.
|
||||
|
||||
Origin Org Gateway Target Org
|
||||
+----------+ +---------+ +----------+
|
||||
| Agent | |Provnce | | Verifier |
|
||||
| Registry |--->| Bridge |--->| Registry |
|
||||
+----+-----+ +----+----+ +----+-----+
|
||||
| | |
|
||||
+----+-----+ +----+----+ +----+-----+
|
||||
|Provenance| | Chain | |Provenance|
|
||||
| Record |--->| Linker |--->| Record |
|
||||
+----------+ +---------+ +----------+
|
||||
|
||||
Figure 2: Cross-Domain Provenance Tracking
|
||||
|
||||
Integration with OAuth 2.0 and OpenID Connect ecosystems follows
|
||||
the Agent Authorization Profile (AAP) [draft-aap-oauth-profile]
|
||||
extension pattern. Existing OAuth 2.0 authorization servers can be
|
||||
|
||||
Reference in New Issue
Block a user