<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude"
     ipr="trust200902"
     docName="draft-kamimura-vap-framework-00"
     category="info"
     consensus="false"
     submissionType="IETF"
     xml:lang="en"
     version="3">

  <front>
    <title abbrev="VAP Framework">Verifiable AI Provenance Framework (VAP): An Architectural Framework for Evidentiary-Grade AI Decision Trails</title>

    <seriesInfo name="Internet-Draft" value="draft-kamimura-vap-framework-00"/>

    <author fullname="TOKACHI KAMIMURA" initials="T." surname="Kamimura">
      <organization>VeritasChain Standards Organization</organization>
      <address>
        <postal>
          <country>Japan</country>
        </postal>
        <email>kamimura@veritaschain.org</email>
        <uri>https://veritaschain.org</uri>
      </address>
    </author>

    <date year="2026" month="January" day="8"/>

    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>

    <keyword>AI</keyword>
    <keyword>provenance</keyword>
    <keyword>audit</keyword>
    <keyword>transparency</keyword>
    <keyword>SCITT</keyword>
    <keyword>RATS</keyword>

    <abstract>
      <t>Automated decision-making systems, including AI and algorithmic
      systems in critical infrastructure, currently lack standardized
      mechanisms for producing evidentiary-grade provenance records that
      can withstand independent verification.  Traditional logging
      approaches fail to provide the cryptographic guarantees required for
      regulatory compliance, forensic investigation, and cross-organizational
      accountability.</t>

      <t>This document describes the Verifiable AI Provenance Framework
      (VAP), an architectural framework that defines requirements for
      producing verifiable decision trails using existing IETF security
      technologies.  VAP does not define new protocols or cryptographic
      primitives; rather, it provides an architectural coordination layer
      that enables domain-specific profiles to leverage Supply Chain
      Integrity, Transparency and Trust (SCITT), Remote Attestation
      Procedures (RATS), CBOR Object Signing and Encryption (COSE), and
      related IETF work in a consistent manner.</t>

      <t>This document is intended to frame the problem space and facilitate
      discussion about whether architectural coordination work is needed
      in this area.</t>
    </abstract>
  </front>

  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The deployment of automated decision-making systems across critical
      infrastructure has created an urgent need for evidentiary-grade
      provenance records.  These systems--including AI-driven trading
      algorithms, autonomous vehicle controllers, medical diagnostic
      systems, and public administration scoring systems--make decisions
      that significantly impact human welfare and require robust audit
      trails for regulatory compliance, forensic analysis, and
      accountability determination.</t>

      <t>Current approaches to logging automated system behavior typically
      rely on traditional audit logs that lack the cryptographic
      properties necessary to serve as reliable evidence.  While existing
      IETF technologies provide many of the necessary building blocks,
      there is no established architectural framework for applying these
      technologies consistently across different domains.</t>

      <t>This document proposes a unifying framework that coordinates existing
      IETF security building blocks--specifically SCITT for transparency
      infrastructure, RATS for environment attestation, and COSE for
      cryptographic operations--to achieve tamper-evident and provably
      complete audit trails for high-impact AI and automated systems.</t>

      <t>This document describes the Verifiable AI Provenance Framework
      (VAP), which aims to address this gap by defining architectural
      requirements for evidentiary-grade provenance while leveraging
      existing IETF work wherever possible.</t>

      <t>VAP is positioned as a specialized evidentiary and forensic layer
      focused on producing cryptographically verifiable decision trails.
      It is not intended to be a comprehensive AI governance protocol;
      rather, it addresses the specific problem of how to record and
      verify what decisions an automated system made, when, and based on
      what inputs.  Broader governance concerns such as authorization
      policies, risk classification, and real-time approval workflows
      are outside VAP's scope but may consume VAP provenance data.</t>

      <section anchor="traditional-logs">
        <name>Why Traditional Logs Are Insufficient</name>
        <t>Traditional logging mechanisms, including syslog <xref target="RFC5424"/>,
        database audit trails, and application-level logs, suffer from several
        fundamental limitations when used as evidence of automated system
        behavior:</t>

        <dl>
          <dt>Mutability:</dt>
          <dd>Log entries can be modified or deleted without
          detection, undermining their evidentiary value.</dd>

          <dt>Ordering Uncertainty:</dt>
          <dd>Without cryptographic chaining, the sequence
          of events cannot be independently verified; entries may be
          inserted, reordered, or removed.</dd>

          <dt>No Completeness Proof:</dt>
          <dd>Traditional logs provide no mechanism to
          prove that no entries have been omitted between any two recorded
          events.</dd>

          <dt>Single-Party Control:</dt>
          <dd>Logs typically reside under the sole control
          of the system operator, requiring auditors to trust the operator's
          integrity.</dd>

          <dt>No Independent Verification:</dt>
          <dd>Third parties cannot verify log
          integrity without trusting the log-producing entity.</dd>
        </dl>

        <t>These limitations render traditional logs insufficient for
        regulatory evidence, forensic reconstruction, or cross-organizational
        accountability determination.</t>
      </section>

      <section anchor="cross-sector">
        <name>Cross-Sector Applicability</name>
        <t>While particular implementations may focus on specific sectors, the
        underlying requirement for verifiable decision provenance is domain-
        agnostic.  The same fundamental properties--non-repudiation,
        completeness verification, and independent auditability--are required
        across multiple sectors:</t>

        <dl>
          <dt>Financial Services:</dt>
          <dd>Algorithmic trading systems subject to
          regulations such as MiFID II RTS 25 and SEC Rule 17a-4.</dd>

          <dt>Healthcare:</dt>
          <dd>AI diagnostic systems subject to FDA medical device
          regulations (21 CFR Part 11) and HIPAA requirements.</dd>

          <dt>Transportation:</dt>
          <dd>Autonomous vehicle systems requiring incident
          reconstruction capabilities per UN Regulation 157.</dd>

          <dt>Public Administration:</dt>
          <dd>Automated scoring and decision systems
          subject to administrative procedure requirements and GDPR
          Article 22 (automated individual decision-making).</dd>

          <dt>Energy Infrastructure:</dt>
          <dd>AI-driven grid management systems subject
          to critical infrastructure regulations including NIS2 Directive.</dd>
        </dl>

        <t>This cross-sector relevance motivates an architectural framework
        approach rather than domain-specific point solutions.</t>
      </section>

      <section anchor="regulatory-context">
        <name>Regulatory Context</name>
        <t>Several regulatory frameworks are creating immediate demand for
        technical standards addressing AI system auditability:</t>

        <section anchor="eu-ai-act-article12">
          <name>EU AI Act Article 12</name>
          <t>The European Union's AI Act <xref target="EU-AI-ACT"/> Article 12 establishes
          logging requirements for high-risk AI systems that become enforceable
          on 2 August 2026.  These requirements include:</t>

          <ul>
            <li>Automatic event recording over the system's lifetime</li>
            <li>Traceability for risk identification, post-market monitoring,
            and operational oversight</li>
            <li>Retention periods of minimum 6 months (longer if required by
            sector-specific law)</li>
            <li>Tamper-evident storage preventing log manipulation</li>
            <li>Logging of human intervention and manual overrides with
            attribution</li>
          </ul>

          <t>Currently, no IETF RFCs directly address these logging requirements.
          VAP aims to provide protocol-level specifications that complement
          the requirements framework being developed by ISO/IEC and
          CEN-CENELEC JTC 21.</t>
        </section>

        <section anchor="other-regulatory">
          <name>Other Regulatory Drivers</name>
          <t>Additional regulatory frameworks creating demand for verifiable AI
          provenance include:</t>

          <ul>
            <li>MiFID II/III RTS 25 (algorithmic trading record-keeping)</li>
            <li>SEC Rule 17a-4 (broker-dealer record retention)</li>
            <li>NIST AI RMF 1.0 <xref target="NIST-AI-RMF"/> (AI risk management framework)</li>
            <li>ISO/IEC 42001:2023 <xref target="ISO-42001"/> (AI management systems)</li>
            <li>ISO/IEC DIS 24970 (AI system logging - in development)</li>
          </ul>
        </section>
      </section>

      <section anchor="scope">
        <name>Scope of This Document</name>
        <t>This document:</t>
        <ul>
          <li>Describes the problem space and requirements for evidentiary-grade
          AI/automated system provenance</li>
          <li>Proposes an architectural framework (VAP) for addressing these
          requirements</li>
          <li>Maps VAP concepts to existing IETF technologies</li>
          <li>Discusses the relationship between the framework and domain-specific
          profiles</li>
        </ul>

        <t>This document does not:</t>
        <ul>
          <li>Define new cryptographic primitives or protocols</li>
          <li>Specify wire formats or APIs</li>
          <li>Mandate particular implementations or deployment models</li>
          <li>Address the verification of AI model correctness or fairness</li>
          <li>Define comprehensive AI governance protocols (authorization,
          risk classification, approval workflows)</li>
        </ul>

        <section anchor="other-ai-work">
          <name>Relationship to Other IETF AI Work</name>
          <t>It is important to distinguish VAP from other AI-related work in
          the IETF:</t>

          <dl>
            <dt>AIPREF (AI Preferences):</dt>
            <dd>The AIPREF working group addresses how
            content owners express preferences about AI training data
            collection (e.g., robots.txt extensions).  VAP does not address
            training data provenance; rather, it focuses on the runtime
            decision-making of deployed AI systems.  AIPREF governs what
            data AI may learn from; VAP records what decisions AI systems
            make after deployment.</dd>

            <dt>WIMSE (Workload Identity in Multi-System Environments):</dt>
            <dd>The WIMSE working group addresses identity and authentication for
            workloads in cloud-native environments.  VAP profiles may
            leverage WIMSE for AI agent identity management and signing key
            issuance, treating WIMSE as complementary infrastructure rather
            than overlapping scope.</dd>
          </dl>
        </section>
      </section>

      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
        NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
        "MAY", and "OPTIONAL" in this document are to be interpreted as
        described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
        when, and only when, they appear in all capitals, as shown here.</t>

        <t>Note that this document primarily uses descriptive rather than
        normative language, as it describes an architectural framework rather
        than a protocol specification.</t>
      </section>
    </section>

    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>This section describes the specific gaps in current approaches to
      automated system auditability that motivate the VAP framework.</t>

      <section anchor="non-repudiation-gaps">
        <name>Non-Repudiation Gaps</name>
        <t>Non-repudiation requires that an entity cannot deny having performed
        an action.  Current audit approaches often fail to provide this
        guarantee because:</t>

        <ul>
          <li>Logs may not be cryptographically signed by the acting entity.</li>
          <li>Signatures, when present, may use keys that are not adequately
          protected or attested.</li>
          <li>The relationship between the signing key and the claimed identity
          may not be independently verifiable.</li>
        </ul>

        <t>For automated systems, non-repudiation is particularly challenging
        because the "actor" may be an algorithm rather than a human, requiring
        clear identification of the specific system version, configuration,
        and operational parameters that produced a given decision.</t>

        <t>The Entity Attestation Token (EAT) <xref target="RFC9711"/> provides a foundation
        for addressing these challenges through standardized claims for
        device and entity identification, software measurements, and
        freshness guarantees.</t>
      </section>

      <section anchor="integrity-completeness">
        <name>Integrity Without Completeness</name>
        <t>Many existing approaches can demonstrate that individual log entries
        have not been modified (integrity), but cannot prove that no entries
        have been omitted (completeness).  This gap is critical because:</t>

        <ul>
          <li>An adversary can selectively delete unfavorable entries while
          preserving the integrity of remaining entries.</li>
          <li>Auditors cannot distinguish between "no events occurred during
          period X" and "events were deleted from period X".</li>
          <li>Regulatory requirements often mandate complete audit trails, not
          merely tamper-evident individual entries.</li>
        </ul>

        <t>The Certificate Transparency model <xref target="RFC6962"/> demonstrated that
        completeness can be addressed through append-only logs with Merkle
        tree commitments, but this pattern has not been widely applied to
        automated system audit trails.  See <xref target="ct-lessons"/> for lessons learned.</t>

        <t>Specifically, Merkle tree-based Receipts enable two critical proofs:</t>

        <ul>
          <li>Inclusion Proof: Proves a specific record exists in the log at
          a given tree state.</li>
          <li>Consistency Proof: Proves that a later tree state is an append-only
          extension of an earlier state--no records were removed or
          modified between the two states.</li>
        </ul>

        <t>By requiring both proof types, VAP enables detection of attempts to
        selectively omit records.  Sequential record identifiers (e.g.,
        monotonic sequence numbers or UUID v7 timestamps) provide additional
        gap detection capability.</t>
      </section>

      <section anchor="responsibility-boundaries">
        <name>Missing Responsibility Boundaries</name>
        <t>Automated systems frequently operate across organizational boundaries,
        creating uncertainty about responsibility allocation:</t>

        <ul>
          <li>An AI system may receive inputs from multiple external sources
          whose integrity cannot be independently verified.</li>
          <li>Decisions may be influenced by models trained on data from various
          parties.</li>
          <li>The chain of custody for decision inputs may span multiple
          organizations with different trust levels.</li>
        </ul>

        <t>Current logging approaches typically capture only the local view of
        a single system, without cryptographic binding to the provenance of
        inputs or the responsibilities of other parties in the decision
        chain.</t>

        <t>Note: RFC 9334 Errata 7314 identifies terminology ambiguities
        regarding entity and role definitions in multi-party scenarios.
        VAP profiles should carefully define responsibility boundaries
        with explicit reference to this errata when mapping to RATS
        concepts.</t>
      </section>

      <section anchor="independent-verify">
        <name>Inability to Independently Verify</name>
        <t>Perhaps the most fundamental gap is that current approaches require
        trust in the log-producing entity.  An auditor examining a
        traditional audit trail must trust that:</t>

        <ul>
          <li>The logging system was correctly implemented.</li>
          <li>The operator did not modify logs after the fact.</li>
          <li>The presented logs represent the complete record.</li>
          <li>Timestamps accurately reflect when events occurred.</li>
        </ul>

        <t>This trust requirement is particularly problematic when the entity
        being audited has an incentive to present a favorable but inaccurate
        record, which is precisely when audit trails are most needed.</t>
      </section>

      <section anchor="summary-gaps">
        <name>Summary of Gaps</name>
        <t>The following table summarizes the gaps that VAP addresses:</t>

        <table>
          <name>Summary of Gaps in Current Approaches</name>
          <thead>
            <tr>
              <th>Gap</th>
              <th>Traditional Approach</th>
              <th>VAP Requirement</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td>Non-repudiation</td>
              <td>Trust-based</td>
              <td>Cryptographic signatures with attested keys</td>
            </tr>
            <tr>
              <td>Completeness</td>
              <td>Not addressed</td>
              <td>Merkle tree proofs</td>
            </tr>
            <tr>
              <td>Cross-org accountability</td>
              <td>Point-to-point</td>
              <td>Verifiable chains</td>
            </tr>
            <tr>
              <td>Independent verification</td>
              <td>Trust operator</td>
              <td>External anchoring</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>

    <section anchor="design-goals">
      <name>Design Goals</name>
      <t>This section describes the high-level design goals that guide the
      VAP framework.</t>

      <section anchor="verifiability-trust">
        <name>Verifiability Over Trust</name>
        <t>The fundamental principle of VAP is "Verify, Don't Trust."  Rather
        than requiring auditors to trust log-producing entities, VAP enables
        mathematical verification of:</t>

        <ul>
          <li>Individual record integrity (the record has not been modified).</li>
          <li>Record completeness (no records have been omitted).</li>
          <li>Temporal ordering (records appear in the correct sequence).</li>
          <li>Actor attribution (the claimed entity produced the record).</li>
        </ul>

        <t>This shift from trust to verification is essential for audit
        scenarios where the audited entity may have incentives to present
        inaccurate records.</t>
      </section>

      <section anchor="crypto-completeness">
        <name>Cryptographic Completeness</name>
        <t>VAP requires that completeness be cryptographically verifiable.  This
        means:</t>

        <ul>
          <li>Auditors can prove that they have received all records, not just
          a selected subset.</li>
          <li>Gaps in the record sequence are detectable.</li>
          <li>Historical states of the log can be reconstructed and verified.</li>
        </ul>

        <t>This goes beyond traditional integrity (individual records are
        unmodified) to ensure that the entire audit trail is complete and
        verifiable.</t>
      </section>

      <section anchor="independent-verification">
        <name>Independent Verification</name>
        <t>VAP should enable verification without requiring cooperation from
        the entity being audited.  This requires:</t>

        <ul>
          <li>External anchoring of commitments to independent third parties.</li>
          <li>Standard formats that any verifier can process.</li>
          <li>Public or shared verification infrastructure where appropriate.</li>
        </ul>
      </section>

      <section anchor="accountability-boundaries">
        <name>Accountability Across Organizational Boundaries</name>
        <t>Automated systems increasingly operate in environments where:</t>

        <ul>
          <li>Inputs come from external parties whose integrity matters.</li>
          <li>Outputs are consumed by downstream systems operated by others.</li>
          <li>Multiple organizations may share responsibility for a decision.</li>
        </ul>

        <t>VAP should support clear accountability boundaries by enabling:</t>

        <ul>
          <li>Cryptographic binding of inputs to their sources.</li>
          <li>Clear delineation of which entity is responsible for each
          assertion.</li>
          <li>Verification that does not require trust in intermediate parties.</li>
        </ul>
      </section>

      <section anchor="domain-agnosticism">
        <name>Domain Agnosticism</name>
        <t>While particular applications of VAP may be domain-specific, the
        framework itself should be domain-agnostic:</t>

        <ul>
          <li>Core concepts should apply across different sectors (finance,
          healthcare, transportation, etc.).</li>
          <li>Domain-specific requirements should be addressed through profiles
          that extend the base framework.</li>
          <li>The framework should not mandate domain-specific data formats or
          semantics.</li>
        </ul>

        <t>This approach enables reuse of verification infrastructure across
        domains while allowing each domain to define its specific
        requirements.</t>
      </section>
    </section>

    <section anchor="architecture-overview">
      <name>VAP Architecture Overview</name>
      <t>This section describes the conceptual architecture of VAP.  This is
      an architectural framework, not a protocol specification; actual
      implementations would realize these concepts using specific
      technologies such as those described in <xref target="ietf-mapping"/>.</t>

      <section anchor="layered-architecture">
        <name>Layered Architecture</name>
        <t>VAP defines three conceptual layers:</t>

        <dl>
          <dt>Integrity Layer:</dt>
          <dd>Provides tamper-evidence for individual records and
          the overall log structure.  This layer addresses per-record integrity
          through cryptographic hashing, forward chaining to create append-only
          structure, periodic commitments (e.g., Merkle roots) for efficient
          verification, and external anchoring for independent verification.</dd>

          <dt>Provenance Layer:</dt>
          <dd>Captures the "what, when, who, why" of each
          decision.  This layer defines actor identification (which system/model
          produced the decision), input provenance (what data informed the
          decision), decision context (parameters, constraints, environmental
          factors), and output characterization (what was decided/recommended/
          executed).</dd>

          <dt>Accountability Layer:</dt>
          <dd>Enables responsibility assignment and cross-organizational
          verification.  This layer provides responsibility boundaries between
          parties, verification interfaces for external auditors, evidence
          packaging for regulatory submission, and cross-reference capabilities
          for multi-party scenarios.</dd>
        </dl>

        <t>These layers are conceptual; actual implementations may combine them
        in various ways depending on deployment requirements.</t>
      </section>

      <section anchor="framework-profiles">
        <name>Relationship Between Framework and Profiles</name>
        <t>VAP is designed as a framework that supports domain-specific profiles.
        The framework defines:</t>

        <ul>
          <li>Common requirements that apply across domains.</li>
          <li>Mapping to underlying IETF technologies.</li>
          <li>Extension points where profiles can add domain-specific
          requirements.</li>
        </ul>

        <t>Profiles define:</t>

        <ul>
          <li>Domain-specific event schemas.</li>
          <li>Regulatory mapping for the specific domain.</li>
          <li>Conformance requirements appropriate to the domain.</li>
          <li>Any domain-specific extensions to the base framework.</li>
        </ul>

        <t>This separation allows the framework to remain stable while profiles
        evolve to meet changing domain requirements.</t>
      </section>

      <section anchor="crypto-agility">
        <name>Cryptographic Agility</name>
        <t>VAP systems should support cryptographic agility, meaning the ability
        to:</t>

        <ul>
          <li>Update cryptographic algorithms without protocol changes.</li>
          <li>Support multiple algorithms during transition periods.</li>
          <li>Clearly document the security properties provided by chosen
          algorithms.</li>
        </ul>

        <t>This approach, often called "crypto-agility," is essential given the
        ongoing evolution of cryptographic best practices and the transition
        to post-quantum algorithms.</t>

        <section anchor="pqc-considerations">
          <name>Post-Quantum Cryptography Considerations</name>
          <t>NIST has standardized three post-quantum cryptographic algorithms in
          August 2024:</t>

          <ul>
            <li>FIPS 203 <xref target="FIPS-203"/> (ML-KEM): Module-Lattice-Based
            Key-Encapsulation Mechanism</li>
            <li>FIPS 204 <xref target="FIPS-204"/> (ML-DSA): Module-Lattice-Based
            Digital Signature Algorithm</li>
            <li>FIPS 205 <xref target="FIPS-205"/> (SLH-DSA): Stateless Hash-Based
            Digital Signature Algorithm</li>
          </ul>

          <t>For long-lived AI provenance records that may need to remain
          verifiable for decades, VAP profiles should consider post-quantum
          signature algorithms.  The COSE working group is standardizing
          ML-DSA for COSE <xref target="I-D.ietf-cose-dilithium"/>, which registers:</t>

          <ul>
            <li>ML-DSA-44 (COSE algorithm value -48): Security level 2</li>
            <li>ML-DSA-65 (COSE algorithm value -49): Security level 3</li>
            <li>ML-DSA-87 (COSE algorithm value -50): Security level 5</li>
          </ul>

          <t>Profiles may mandate specific algorithms for interoperability within
          a domain, but should do so in a way that allows future algorithm
          updates.</t>
        </section>
      </section>
    </section>

    <section anchor="ietf-mapping">
      <name>Mapping to Existing IETF Work</name>
      <t>A key principle of VAP is to leverage existing IETF technologies
      wherever possible rather than defining new protocols or formats.
      This section describes how VAP concepts map to ongoing IETF work.</t>

      <figure>
        <name>VAP Relationship to IETF Working Groups</name>
        <artwork type="ascii-art"><![CDATA[
        +--------------------+
        |        VAP         |   (Architectural Framework)
        | (This Document)    |
        +--------------------+
                 |
    +------------+------------+------------+
    |            |            |            |
    v            v            v            v
 +------+    +------+    +------+    +-------+
 | SCITT|    | RATS |    | COSE |    | WIMSE |  (IETF WGs)
 +------+    +------+    +------+    +-------+
    |            |            |            |
    v            v            v            v
 +------+    +------+    +------+    +-------+
 | CFRG |    | JOSE |    | etc. |    | SPICE |  (Supporting)
 +------+    +------+    +------+    +-------+
        ]]></artwork>
      </figure>

      <section anchor="scitt-mapping">
        <name>SCITT (Supply Chain Integrity, Transparency and Trust)</name>
        <t>The SCITT working group <xref target="I-D.ietf-scitt-architecture"/> provides the
        most direct mapping to VAP's Integrity Layer requirements.</t>

        <section anchor="scitt-concept-mapping">
          <name>Concept Mapping</name>

          <table>
            <name>VAP to SCITT Concept Mapping</name>
            <thead>
              <tr>
                <th>VAP Concept</th>
                <th>SCITT Equivalent</th>
                <th>Notes</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td>Provenance Record</td>
                <td>Signed Statement</td>
                <td>COSE_Sign1 with CWT claims per RFC 9597</td>
              </tr>
              <tr>
                <td>Append-Only Log</td>
                <td>Transparency Service</td>
                <td>Maintains ordered log via VDS</td>
              </tr>
              <tr>
                <td>Merkle Commitment</td>
                <td>Receipt</td>
                <td>COSE Receipt per Merkle Tree Proofs</td>
              </tr>
              <tr>
                <td>Verification Policy</td>
                <td>Registration Policy</td>
                <td>Admission criteria</td>
              </tr>
              <tr>
                <td>External Anchor</td>
                <td>Merkle Tree Root</td>
                <td>Published via Signed Tree Head</td>
              </tr>
              <tr>
                <td>Transparent Record</td>
                <td>Transparent Statement</td>
                <td>Statement + Receipt</td>
              </tr>
            </tbody>
          </table>
        </section>

        <section anchor="scitt-charter">
          <name>SCITT Charter Scope Considerations</name>
          <t>The SCITT WG charter explicitly scopes work to "software supply
          chain" and "firmware."  However, the charter also notes that SCITT
          is "applicable to any other type of supply chain statements."  VAP
          positions AI provenance as content-agnostic payload within SCITT's
          Signed Statements, which is explicitly supported by the
          architecture's design.</t>

          <t>Profiles that wish to use SCITT infrastructure should:</t>

          <ul>
            <li>Frame provenance records as supply chain statements about AI
            system behavior</li>
            <li>Use standard SCITT Registration Policies for admission control</li>
            <li>Leverage existing Transparency Service implementations where
            available</li>
          </ul>
        </section>

        <section anchor="scitt-terminology">
          <name>Key SCITT Terminology</name>
          <t>VAP profiles using SCITT should adopt the following terminology from
          <xref target="I-D.ietf-scitt-architecture"/>:</t>

          <ul>
            <li>Transparency Service: The service operating the append-only log</li>
            <li>Signed Statement: A COSE_Sign1 signed object containing the
            provenance payload</li>
            <li>Receipt: A COSE Receipt proving inclusion in the log</li>
            <li>Transparent Statement: A Signed Statement combined with its
            Receipt</li>
            <li>Registration Policy: Rules governing what statements are accepted</li>
            <li>Verifiable Data Structure (VDS): The cryptographic structure
            (typically Merkle tree) underlying the log</li>
          </ul>
        </section>

        <section anchor="external-anchor">
          <name>External Anchor Requirements</name>
          <t>While SCITT provides robust tamper-evidence through Merkle tree
          commitments, VAP profiles should consider requiring periodic
          External Anchoring--the publication of Merkle Tree roots to
          independent, external systems (e.g., public blockchains, trusted
          timestamping services, or Certificate Transparency logs).</t>

          <t>External Anchoring addresses a specific threat: a malicious
          Transparency Service operator who might attempt to rewrite history
          by reconstructing the entire log with altered content.  By
          periodically anchoring the Merkle root to external systems beyond
          the operator's control, VAP ensures that:</t>

          <ul>
            <li>Historical log states are committed to third-party systems</li>
            <li>Any attempt to reconstruct a different history would produce
            Merkle roots inconsistent with previously anchored values</li>
            <li>Regulators and auditors can verify that logs have not been
            retroactively altered</li>
          </ul>

          <t>This requirement emerged from domain profile experience (VCP v1.1)
          where the "Verify, Don't Trust" principle demanded cryptographic
          guarantees even against collusion between system operators and
          Transparency Service providers.  Profiles may specify anchoring
          frequency (e.g., hourly, daily) based on domain-specific risk
          assessment.</t>
        </section>

        <section anchor="scitt-alignment">
          <name>Alignment Approach</name>
          <t>VAP profiles that address the Integrity Layer requirements should:</t>

          <ul>
            <li>Encode provenance records as SCITT Signed Statements where
            applicable.</li>
            <li>Include CWT Claims (COSE header parameter 15) with at minimum
            `iss` (issuer) and `sub` (subject) claims per <xref target="RFC9597"/>.</li>
            <li>Use SCITT Transparency Services for append-only log maintenance.</li>
            <li>Leverage COSE Receipts per <xref target="I-D.ietf-cose-merkle-tree-proofs"/>
            for inclusion proofs, using the registered COSE header parameters:
            receipts (394), vds (395), and vdp (396).</li>
            <li>Define Registration Policies appropriate to the domain.</li>
          </ul>

          <t>This alignment allows VAP-compliant systems to benefit from the
          SCITT ecosystem, including existing Transparency Service
          implementations and verification tooling.</t>
        </section>
      </section>

      <section anchor="rats-mapping">
        <name>Remote Attestation Procedures (RATS)</name>
        <t>The RATS working group <xref target="RFC9334"/> addresses the question of how to
        verify the state of a system producing attestations.  This is
        relevant to VAP's Accountability Layer.</t>

        <t>Per RFC 9334, the RATS architecture defines specific roles and data
        types: an Attester produces Evidence (claims about its own state),
        a Verifier evaluates that Evidence and produces an Attestation
        Result, and a Relying Party consumes the Attestation Result to make
        trust decisions.  VAP's cross-organizational verification scenarios
        map naturally to this model.</t>

        <section anchor="rats-concept-mapping">
          <name>Concept Mapping</name>

          <table>
            <name>VAP to RATS Concept Mapping</name>
            <thead>
              <tr>
                <th>VAP Concept</th>
                <th>RATS Equivalent</th>
                <th>Notes</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td>Actor Attestation</td>
                <td>Attester</td>
                <td>Entity producing provenance records</td>
              </tr>
              <tr>
                <td>Environment Binding</td>
                <td>Evidence</td>
                <td>Claims about Attester state</td>
              </tr>
              <tr>
                <td>Cross-Org Verify</td>
                <td>Verifier</td>
                <td>Third-party verification svc</td>
              </tr>
              <tr>
                <td>Verification Result</td>
                <td>Attestation Result</td>
                <td>Verifier output for Relying Party</td>
              </tr>
              <tr>
                <td>Auditor/Regulator</td>
                <td>Relying Party</td>
                <td>Consumes results for trust decision</td>
              </tr>
            </tbody>
          </table>
        </section>

        <section anchor="eat-claims">
          <name>Entity Attestation Token (EAT)</name>
          <t>The Entity Attestation Token specification <xref target="RFC9711"/> provides
          attestation-oriented claims particularly relevant to AI provenance:</t>

          <ul>
            <li>Device/entity identification: `ueid`, `sueid` claims for unique
            AI model or inference endpoint identification</li>
            <li>Software measurements: `manifests` and `measurements` claims for
            recording model hashes, weights, and dependencies</li>
            <li>Composite systems: `submods` claim for representing ensemble
            models or ML pipelines</li>
            <li>Freshness: `eat_nonce` ensuring non-replayable provenance records</li>
            <li>Jurisdictional compliance: `location` claim for capturing
            inference geography (relevant to data sovereignty requirements)</li>
          </ul>
        </section>

        <section anchor="rats-additional">
          <name>Additional RATS Documents</name>
          <t>VAP profiles requiring strong attestation should also consider:</t>

          <ul>
            <li>Concise Reference Integrity Manifest (CoRIM)
            <xref target="I-D.ietf-rats-corim"/>: For model reference values</li>
            <li>EAT Attestation Results <xref target="I-D.fv-rats-ear"/>: Standardized format
            for attestation results</li>
            <li>Attestation Results for Secure Interactions (AR4SI)
            <xref target="I-D.ietf-rats-ar4si"/>: Trustworthiness vectors</li>
          </ul>
        </section>

        <section anchor="rats-alignment">
          <name>Alignment Approach</name>
          <t>RATS concepts are particularly relevant when VAP systems need to
          attest to the integrity of the log-producing environment itself:</t>

          <ul>
            <li>Entity Attestation Tokens (EAT) <xref target="RFC9711"/> can provide evidence
            about the execution environment.</li>
            <li>Hardware-rooted attestation can strengthen claims about system
            integrity.</li>
            <li>The RATS architecture provides a framework for reasoning about
            trust in the log-producing system.</li>
          </ul>

          <t>VAP does not require RATS integration, but profiles may specify RATS
          usage for environments where stronger assurance about the log
          producer is needed.</t>
        </section>
      </section>

      <section anchor="cose-mapping">
        <name>COSE (CBOR Object Signing and Encryption)</name>
        <t>COSE <xref target="RFC9052"/> provides the cryptographic message formats used by
        both SCITT and RATS.  VAP systems that leverage these technologies
        will use COSE for:</t>

        <ul>
          <li>Digital signatures on provenance records (COSE_Sign1).</li>
          <li>CWT Claims in COSE headers per <xref target="RFC9597"/>.</li>
          <li>Receipts/inclusion proofs (COSE Receipts per
          <xref target="I-D.ietf-cose-merkle-tree-proofs"/>).</li>
          <li>Encrypted payloads when confidentiality is required.</li>
          <li>Algorithm identification and crypto-agility.</li>
        </ul>

        <section anchor="cose-alignment">
          <name>Alignment Approach</name>
          <t>VAP profiles should:</t>

          <ul>
            <li>Use COSE for all cryptographic operations where interoperability
            with SCITT/RATS is desired.</li>
            <li>Follow COSE algorithm recommendations and deprecation guidance.</li>
            <li>Leverage COSE's built-in algorithm agility for future migration,
            including transition to post-quantum algorithms per
            <xref target="I-D.ietf-cose-dilithium"/>.</li>
          </ul>

          <t>Profiles that need JSON-based formats may alternatively use JOSE
          <xref target="RFC7515"/> <xref target="RFC7516"/>, though this limits interoperability with CBOR-
          based ecosystems.</t>
        </section>
      </section>

      <section anchor="cfrg-mapping">
        <name>CFRG (Crypto Forum Research Group)</name>
        <t>The Crypto Forum Research Group (CFRG) provides cryptographic review
        and guidance that informs VAP's cryptographic requirements.  Relevant
        CFRG work includes:</t>

        <ul>
          <li>Guidance on hash function selection for Merkle trees.</li>
          <li>Signature algorithm recommendations.</li>
          <li>Post-quantum cryptography considerations.</li>
        </ul>

        <t>VAP does not directly depend on CFRG outputs, but profiles should
        reference CFRG recommendations when selecting cryptographic
        algorithms.</t>
      </section>

      <section anchor="wimse-mapping">
        <name>WIMSE (Workload Identity in Multi-System Environments)</name>
        <t>The WIMSE working group addresses identity and authentication for
        workloads (processes, containers, serverless functions) in cloud-
        native and multi-system environments.  For VAP, WIMSE is relevant
        to the question of how AI systems obtain and manage the signing
        keys used to authenticate provenance records.</t>

        <section anchor="wimse-ai-agent">
          <name>Relevance to AI Agent Identity</name>
          <t>AI systems operating as autonomous agents require identity
          credentials to sign provenance records.  WIMSE provides mechanisms
          for:</t>

          <ul>
            <li>Workload identity issuance in containerized/cloud environments</li>
            <li>Credential lifecycle management</li>
            <li>Cross-organizational identity federation</li>
          </ul>

          <t>The individual draft <xref target="I-D.ni-wimse-ai-agent-identity"/> specifically
          addresses AI agent identity within the WIMSE framework.</t>
        </section>

        <section anchor="wimse-alignment">
          <name>Alignment Approach</name>
          <t>VAP does not define identity management mechanisms; instead, it
          assumes that actors (AI systems) possess valid signing credentials.
          Profiles may specify:</t>

          <ul>
            <li>WIMSE as the identity infrastructure for cloud-native AI
            deployments</li>
            <li>Integration points between WIMSE credential issuance and VAP
            signing requirements</li>
            <li>Trust model considerations when AI agents operate across
            organizational boundaries</li>
          </ul>

          <t>This separation of concerns allows VAP to focus on provenance
          structure and verification, while delegating identity management
          to specialized infrastructure like WIMSE.</t>
        </section>
      </section>

      <section anchor="relationship-summary">
        <name>Relationship Summary</name>
        <t>The following table summarizes how VAP layers map to IETF work:</t>

        <table>
          <name>VAP Layers to IETF Work Mapping</name>
          <thead>
            <tr>
              <th>VAP Layer</th>
              <th>Primary IETF Work</th>
              <th>Supporting Work</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td>Integrity Layer</td>
              <td>SCITT</td>
              <td>COSE, Merkle Tree Proofs, CT (RFC 6962/9162)</td>
            </tr>
            <tr>
              <td>Provenance Layer</td>
              <td>(Domain-specific profiles)</td>
              <td>JSON Schema, CBOR, W3C VC 2.0, C2PA</td>
            </tr>
            <tr>
              <td>Accountability Layer</td>
              <td>RATS, EAT (RFC 9711)</td>
              <td>WIMSE, CoRIM, AR4SI, OAuth/OIDC</td>
            </tr>
          </tbody>
        </table>

        <t>VAP is explicitly designed to avoid duplicating existing IETF work.
        Where existing standards adequately address a requirement, VAP
        profiles should reference those standards rather than defining
        alternatives.</t>
      </section>
    </section>

    <section anchor="why-framework">
      <name>Why a Framework is Needed</name>
      <t>Given that existing IETF technologies provide many of the necessary
      building blocks, one might ask whether a framework document is
      needed.  This section explains the value of architectural
      coordination.</t>

      <t>The challenge is not the absence of suitable technologies, but
      rather:</t>

      <ul>
        <li>Ensuring consistent application of these technologies across
        domains.</li>
        <li>Providing a reference architecture that profile developers can
        follow.</li>
        <li>Identifying gaps that may require additional standardization.</li>
        <li>Enabling interoperability between systems in different domains
        that need to exchange provenance information.</li>
      </ul>

      <section anchor="fragmentation-risk">
        <name>Risk of Fragmentation</name>
        <t>Without architectural coordination, there is a risk that different
        domains will develop incompatible approaches to AI/automated system
        provenance:</t>

        <ul>
          <li>Financial services might develop one approach.</li>
          <li>Healthcare might develop another incompatible approach.</li>
          <li>Automotive might develop yet another.</li>
        </ul>

        <t>This fragmentation would:</t>

        <ul>
          <li>Prevent reuse of verification infrastructure across domains.</li>
          <li>Complicate cross-domain scenarios (e.g., AI systems that span
          finance and healthcare).</li>
          <li>Increase implementation costs by requiring domain-specific tools.</li>
          <li>Create confusion about what "verifiable provenance" means in
          different contexts.</li>
        </ul>

        <t>A framework document can help prevent this fragmentation by
        establishing common vocabulary, requirements, and architectural
        patterns.</t>
      </section>

      <section anchor="profiles-insufficient">
        <name>Profiles Alone Are Insufficient</name>
        <t>One alternative to a framework would be to develop domain-specific
        profiles directly, without an overarching framework.  This approach
        has drawbacks:</t>

        <ul>
          <li>Each profile would need to independently define common concepts.</li>
          <li>There would be no reference for ensuring profiles are compatible.</li>
          <li>Common security considerations would be repeated across profiles.</li>
          <li>It would be unclear how to develop profiles for new domains.</li>
        </ul>

        <t>A framework provides a foundation that profile developers can build
        upon, ensuring consistency while allowing domain-specific
        customization.</t>
      </section>

      <section anchor="coordination-role">
        <name>Architectural Coordination Role</name>
        <t>The value of VAP as a framework lies in its coordination role:</t>

        <ul>
          <li>Defining common requirements that all profiles should meet.</li>
          <li>Mapping those requirements to existing IETF technologies.</li>
          <li>Providing guidance on how to develop compliant profiles.</li>
          <li>Identifying areas where existing standards may be insufficient.</li>
          <li>Enabling discussion of cross-domain interoperability requirements.</li>
        </ul>

        <t>This coordination role does not require VAP to define new protocols;
        rather, it provides the architectural context within which existing
        protocols are applied.</t>
      </section>

      <section anchor="other-governance">
        <name>Relationship to Other AI Governance Work</name>
        <t>VAP is specifically focused on evidentiary-grade decision trails--
        the problem of recording and verifying what decisions were made.
        It is not intended to address the full scope of AI governance, which
        includes concerns such as:</t>

        <ul>
          <li>Risk-based authorization and approval workflows</li>
          <li>Real-time governance decisions</li>
          <li>AI model evaluation and certification</li>
          <li>Federated governance authority networks</li>
        </ul>

        <t>Other work addressing broader AI governance concerns may consume
        VAP provenance data as an input to governance decisions.  VAP
        provides the forensic/evidentiary layer that such systems can build
        upon.</t>
      </section>

      <section anchor="vap-bridge">
        <name>VAP as Bridge Between Static and Runtime Verification</name>
        <t>Examining the existing IETF landscape reveals a gap that VAP
        addresses:</t>

        <dl>
          <dt>SCITT (Supply Chain):</dt>
          <dd>Excels at tracking static artifacts--built
          binaries, signed firmware, software bills of materials.  It
          answers: "Was this the correct, untampered software?"</dd>

          <dt>RATS (Attestation):</dt>
          <dd>Excels at capturing point-in-time system
          state--hardware configuration, OS integrity, TEE status.  It
          answers: "Was the execution environment trustworthy at this
          moment?"</dd>

          <dt>VAP (Decision Provenance):</dt>
          <dd>Captures the dynamic decisions made by
          verified software in verified environments.  It answers: "What
          did the system actually decide, and can we prove it?"</dd>
        </dl>

        <t>The unique value of VAP lies in connecting these domains:</t>

        <ul>
          <li>A SCITT-verified AI model binary...</li>
          <li>...running in a RATS-attested trusted environment...</li>
          <li>...produces decisions that VAP records as evidentiary-grade
          provenance.</li>
        </ul>

        <t>This "missing link" perspective explains why VAP warrants
        architectural coordination: it bridges two established IETF work
        streams to address a problem (dynamic decision accountability) that
        neither fully covers alone.</t>
      </section>
    </section>

    <section anchor="profiles">
      <name>Relationship to Domain-Specific Profiles</name>
      <t>VAP is designed to support domain-specific profiles that tailor the
      framework to particular use cases.  This section describes how
      profiles relate to the framework, using existing work as an example.</t>

      <section anchor="vcp-example">
        <name>Example: Financial Trading (VCP)</name>
        <t>The VeritasChain Protocol (VCP) <xref target="I-D.kamimura-scitt-vcp"/> is a
        profile of VAP focused on AI-driven algorithmic trading systems.
        VCP demonstrates how a profile specializes the framework.</t>
      </section>

      <section anchor="future-profiles">
        <name>Potential Future Profiles</name>
        <t>The framework is designed to accommodate profiles for various domain
        requirements.  Examples of potential future profiles include:</t>

        <dl>
          <dt>Medical AI:</dt>
          <dd>Profiles for diagnostic AI systems, addressing HIPAA
          privacy requirements and FDA medical device regulations.</dd>

          <dt>Autonomous Vehicles:</dt>
          <dd>Profiles for driving decision systems,
          addressing incident reconstruction and liability determination.</dd>

          <dt>Public Administration:</dt>
          <dd>Profiles for government scoring and
          recommendation systems, addressing administrative procedure
          requirements.</dd>

          <dt>Energy Infrastructure:</dt>
          <dd>Profiles for grid management AI, addressing
          critical infrastructure protection requirements.</dd>
        </dl>

        <t>Each profile would define domain-specific event schemas, conformance
        requirements, and regulatory mappings while adhering to the common
        framework requirements.</t>
      </section>

      <section anchor="profile-independence">
        <name>Profile Independence</name>
        <t>It is important to emphasize that:</t>

        <ul>
          <li>VAP does not depend on any particular profile.</li>
          <li>Profiles are developed independently by domain experts.</li>
          <li>A domain can adopt VAP without implementing profiles for other
          domains.</li>
          <li>The framework is complete without reference to any specific
          profile.</li>
        </ul>

        <t>The mention of VCP or other potential profiles in this document is
        illustrative only.  VAP's value lies in providing architectural
        coordination, not in mandating any particular domain application.</t>
      </section>
    </section>

    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As an architectural framework rather than a protocol specification,
      VAP's security considerations are primarily about ensuring that
      profiles and implementations address the relevant threats.  This
      section describes the threat model and explicit non-goals.</t>

      <section anchor="threat-model">
        <name>Threat Model Overview</name>
        <t>VAP addresses threats from entities who might seek to:</t>

        <section anchor="falsify-records">
          <name>Falsify Historical Records</name>
          <t>An operator might attempt to modify, delete, or fabricate historical
          records to conceal problematic behavior or create false evidence.
          VAP addresses this through:</t>

          <ul>
            <li>Cryptographic chaining that makes modification detectable.</li>
            <li>External anchoring that prevents history rewriting.</li>
            <li>Independent verification that does not require operator
            cooperation.</li>
          </ul>
        </section>

        <section anchor="omit-records">
          <name>Omit Unfavorable Records</name>
          <t>An operator might attempt to selectively omit records that reveal
          problematic behavior while preserving favorable records.  VAP
          addresses this through:</t>

          <ul>
            <li>Completeness verification via Merkle proofs.</li>
            <li>Sequence numbering that reveals gaps.</li>
            <li>External commitments that prove log state at specific times.</li>
          </ul>
        </section>

        <section anchor="misattribute">
          <name>Misattribute Actions</name>
          <t>An operator might attempt to attribute actions to a different actor
          (algorithm, operator, or external party) than the one actually
          responsible.  VAP addresses this through:</t>

          <ul>
            <li>Digital signatures binding actions to specific actors.</li>
            <li>Identity verification through established PKI or attestation
            mechanisms.</li>
            <li>Clear provenance chains for multi-party scenarios.</li>
          </ul>
        </section>

        <section anchor="timing-manipulation">
          <name>Manipulate Timing</name>
          <t>An operator might attempt to manipulate timestamps to change the
          apparent sequence of events.  VAP addresses this through:</t>

          <ul>
            <li>Cryptographic chaining that establishes relative ordering.</li>
            <li>External anchoring that establishes absolute time bounds.</li>
            <li>Trusted timestamping services where stronger guarantees are
            needed.</li>
          </ul>
        </section>
      </section>

      <section anchor="non-goals">
        <name>Explicit Non-Goals</name>
        <t>VAP does not address certain security concerns that are outside its
        scope:</t>

        <dl>
          <dt>AI Model Security:</dt>
          <dd>VAP records what decisions were made, not whether
          those decisions were correct or whether the AI model is secure
          against adversarial attacks.</dd>

          <dt>Input Validation:</dt>
          <dd>VAP can record what inputs were received, but
          does not validate whether inputs were legitimate or malicious.</dd>

          <dt>Confidentiality:</dt>
          <dd>While profiles may address confidentiality, the
          framework focuses on integrity and verifiability rather than
          confidentiality.  Profiles must address confidentiality
          requirements specific to their domain.</dd>

          <dt>Real-Time Detection:</dt>
          <dd>VAP provides forensic and audit capabilities,
          not real-time anomaly detection or intrusion prevention.
          Real-time monitoring systems may use VAP data, but such systems
          are outside VAP's scope.</dd>
        </dl>
      </section>

      <section anchor="privacy-considerations">
        <name>Privacy Considerations</name>
        <t>VAP provenance records may contain sensitive information about:</t>

        <ul>
          <li>Business activities (e.g., trading strategies)</li>
          <li>Personal data (e.g., in healthcare applications)</li>
          <li>Critical infrastructure operations</li>
        </ul>

        <t>Profiles must address privacy requirements specific to their domain,
        which may include:</t>

        <ul>
          <li>Encryption of sensitive payload data.</li>
          <li>Access controls on Transparency Service queries.</li>
          <li>Crypto-shredding mechanisms for data subject to deletion rights
          (e.g., GDPR Article 17).  This technique, corresponding to
          Cryptographic Erasure (CE) as described in NIST SP 800-88 Rev. 1
          <xref target="NIST-SP-800-88"/>, enables effective data deletion by destroying
          encryption keys rather than the encrypted data.</li>
          <li>Selective disclosure mechanisms that reveal only necessary
          information.</li>
        </ul>

        <section anchor="deletion-rights">
          <name>Reconciling Append-Only Logs with Deletion Rights</name>
          <t>A fundamental tension exists between append-only transparency logs
          (where deletion is cryptographically prevented) and regulatory
          requirements for data deletion (e.g., GDPR Article 17 "right to
          erasure").  Profiles addressing domains with deletion requirements
          should consider:</t>

          <ul>
            <li>Off-chain data storage: Register only cryptographic hashes of
            sensitive payloads in the Transparency Service, storing actual
            data in separate systems where deletion is possible.  This
            "hash-only registration" approach preserves verifiability--
            anyone with the original data can verify it matches the
            registered hash--while keeping sensitive content out of the
            immutable log.</li>
            <li>Encryption with key management: Encrypt sensitive payload data
            before registration; deletion is achieved by destroying the
            encryption keys (crypto-shredding).</li>
            <li>Architectural separation: Design systems such that provenance
            metadata (which may need long-term retention) is separated from
            personal data (which may require deletion).</li>
            <li>Redacted proofs: For profiles requiring selective disclosure,
            consider cryptographic techniques (e.g., hash trees with
            selective revelation) that allow proving specific claims without
            revealing the complete record.</li>
          </ul>

          <t>The framework itself does not mandate specific privacy mechanisms,
          but requires that profiles clearly document how privacy requirements
          are addressed.</t>
        </section>
      </section>
    </section>

    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>

      <t>Domain-specific profiles may request IANA registrations for media
      types, COSE algorithm identifiers, or other parameters as needed.
      Such requests would be made in the profile documents, not in this
      framework document.</t>
    </section>

    <section anchor="next-steps">
      <name>Next Steps</name>
      <t>This document is intended to facilitate discussion about whether
      architectural coordination work is needed in the area of AI/automated
      system provenance.</t>

      <section anchor="discussion-path">
        <name>Discussion Path</name>
        <t>The author proposes the following discussion path:</t>

        <ol>
          <li>Present this document for discussion at SecDispatch to determine
          the appropriate venue for further work.</li>
          <li>Solicit feedback from the SCITT and RATS working groups on the
          proposed mappings to their work.</li>
          <li>Gather input from domain experts on whether the framework
          adequately addresses their requirements.</li>
          <li>Based on feedback, determine whether this work should
          proceed as individual submissions building on existing WGs
          (likely SCITT given closest alignment), be considered for a new
          focused work item, or be deferred pending additional implementation
          experience.</li>
        </ol>

        <t>Given the EU AI Act Article 12 enforcement date of 2 August 2026,
        timely progress could position this work as a critical compliance
        enabler.</t>
      </section>

      <section anchor="future-work">
        <name>Potential Future Work</name>
        <t>Depending on community interest, future work might include:</t>

        <ul>
          <li>Development of additional domain-specific profiles.</li>
          <li>Specification of interoperability requirements between profiles.</li>
          <li>Definition of common verification tooling requirements.</li>
          <li>Guidance on regulatory compliance mapping.</li>
          <li>Policy Identification mechanisms: Each domain profile may need
          to identify which operational policy or regulatory requirement
          governs a particular provenance record.  This aligns with SCITT's
          Registration Policy concept and enables automated compliance
          verification.  Future work could standardize policy identifier
          formats and registration procedures.</li>
        </ul>

        <t>This document does not presuppose any particular outcome; it is
        intended to frame the problem and facilitate informed discussion.</t>
      </section>
    </section>
  </middle>

  <back>
    <references>
      <name>References</name>

      <references>
        <name>Normative References</name>

        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9052.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9334.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9597.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9711.xml"/>

      </references>

      <references>
        <name>Informative References</name>

        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5424.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6962.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7515.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7516.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9162.xml"/>

        <reference anchor="I-D.ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <author initials="H." surname="Birkholz" fullname="Henk Birkholz"/>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud"/>
            <author initials="C." surname="Fournet" fullname="Cedric Fournet"/>
            <date year="2025" month="October"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-22"/>
        </reference>

        <reference anchor="I-D.ietf-scitt-scrapi">
          <front>
            <title>SCITT Reference API</title>
            <author initials="H." surname="Birkholz" fullname="Henk Birkholz"/>
            <author initials="G." surname="Geater" fullname="Gavin Geater"/>
            <date year="2025" month="December"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-scrapi-06"/>
        </reference>

        <reference anchor="I-D.ietf-cose-merkle-tree-proofs">
          <front>
            <title>COSE Receipts</title>
            <author initials="O." surname="Steele" fullname="Orie Steele"/>
            <author initials="H." surname="Birkholz" fullname="Henk Birkholz"/>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud"/>
            <author initials="C." surname="Fournet" fullname="Cedric Fournet"/>
            <date year="2026" month="February"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-merkle-tree-proofs-18"/>
        </reference>

        <reference anchor="I-D.ietf-cose-dilithium">
          <front>
            <title>ML-DSA for JOSE and COSE</title>
            <author initials="M." surname="Prorock" fullname="Michael Prorock"/>
            <author initials="O." surname="Steele" fullname="Orie Steele"/>
            <date year="2025" month="November"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-dilithium-11"/>
        </reference>

        <reference anchor="I-D.ietf-rats-corim">
          <front>
            <title>Concise Reference Integrity Manifest</title>
            <author initials="H." surname="Birkholz" fullname="Henk Birkholz"/>
            <author initials="T." surname="Fossati" fullname="Thomas Fossati"/>
            <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande"/>
            <author initials="N." surname="Smith" fullname="Ned Smith"/>
            <author initials="W." surname="Pan" fullname="Wei Pan"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim"/>
        </reference>

        <reference anchor="I-D.fv-rats-ear">
          <front>
            <title>EAT Attestation Results</title>
            <author initials="T." surname="Fossati" fullname="Thomas Fossati"/>
            <author initials="E." surname="Voit" fullname="Eric Voit"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fv-rats-ear"/>
        </reference>

        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <author initials="E." surname="Voit" fullname="Eric Voit"/>
            <author initials="H." surname="Lu" fullname="Hongwei Lu"/>
            <author initials="I." surname="Gonzalez Sanchez" fullname="Ignacio Gonzalez Sanchez"/>
            <author initials="A." surname="Fongen" fullname="Anders Fongen"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si"/>
        </reference>

        <reference anchor="I-D.kamimura-scitt-vcp">
          <front>
            <title>SCITT Profile for Financial Trading Audit Trails: VeritasChain Protocol (VCP)</title>
            <author initials="T." surname="Kamimura" fullname="TOKACHI KAMIMURA"/>
            <date year="2026" month="January"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kamimura-scitt-vcp-02"/>
        </reference>

        <reference anchor="I-D.ni-wimse-ai-agent-identity">
          <front>
            <title>WIMSE Applicability for AI Agents</title>
            <author initials="H." surname="Ni" fullname="Hannes Ni"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ni-wimse-ai-agent-identity-01"/>
        </reference>

        <reference anchor="EU-AI-ACT">
          <front>
            <title>Regulation (EU) 2024/1689 laying down harmonised rules on artificial intelligence (Artificial Intelligence Act)</title>
            <author>
              <organization>European Parliament and Council</organization>
            </author>
            <date year="2024" month="July"/>
          </front>
          <seriesInfo name="Official Journal of the European Union" value="L 1689"/>
        </reference>

        <reference anchor="FIPS-203" target="https://csrc.nist.gov/pubs/fips/203/final">
          <front>
            <title>Module-Lattice-Based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024" month="August"/>
          </front>
          <seriesInfo name="FIPS" value="203"/>
        </reference>

        <reference anchor="FIPS-204" target="https://csrc.nist.gov/pubs/fips/204/final">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024" month="August"/>
          </front>
          <seriesInfo name="FIPS" value="204"/>
        </reference>

        <reference anchor="FIPS-205" target="https://csrc.nist.gov/pubs/fips/205/final">
          <front>
            <title>Stateless Hash-Based Digital Signature Standard</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2024" month="August"/>
          </front>
          <seriesInfo name="FIPS" value="205"/>
        </reference>

        <reference anchor="NIST-AI-RMF" target="https://doi.org/10.6028/NIST.AI.100-1">
          <front>
            <title>Artificial Intelligence Risk Management Framework (AI RMF 1.0)</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2023" month="January"/>
          </front>
          <seriesInfo name="NIST AI" value="100-1"/>
        </reference>

        <reference anchor="NIST-SP-800-88" target="https://doi.org/10.6028/NIST.SP.800-88r1">
          <front>
            <title>Guidelines for Media Sanitization</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2014" month="December"/>
          </front>
          <seriesInfo name="NIST SP" value="800-88 Rev. 1"/>
        </reference>

        <reference anchor="ISO-42001">
          <front>
            <title>Information technology - Artificial intelligence - Management system</title>
            <author>
              <organization>International Organization for Standardization</organization>
            </author>
            <date year="2023" month="December"/>
          </front>
          <seriesInfo name="ISO/IEC" value="42001:2023"/>
        </reference>

        <reference anchor="ISO-23894">
          <front>
            <title>Information technology - Artificial intelligence - Guidance on risk management</title>
            <author>
              <organization>International Organization for Standardization</organization>
            </author>
            <date year="2023" month="February"/>
          </front>
          <seriesInfo name="ISO/IEC" value="23894:2023"/>
        </reference>

        <reference anchor="W3C-VC-2.0" target="https://www.w3.org/TR/vc-data-model-2.0/">
          <front>
            <title>Verifiable Credentials Data Model v2.0</title>
            <author initials="M." surname="Sporny" fullname="Manu Sporny"/>
            <author initials="D." surname="Longley" fullname="Dave Longley"/>
            <author initials="D." surname="Chadwick" fullname="David Chadwick"/>
            <author initials="O." surname="Steele" fullname="Orie Steele"/>
            <date year="2025" month="May"/>
          </front>
          <seriesInfo name="W3C" value="Recommendation"/>
        </reference>

        <reference anchor="C2PA-2.2" target="https://c2pa.org/specifications/specifications/2.2/specs/C2PA_Specification.html">
          <front>
            <title>C2PA Technical Specification 2.2</title>
            <author>
              <organization>Coalition for Content Provenance and Authenticity</organization>
            </author>
            <date year="2025" month="May"/>
          </front>
        </reference>

      </references>
    </references>

    <section anchor="ct-lessons">
      <name>Lessons from Certificate Transparency</name>
      <t>Certificate Transparency (CT) <xref target="RFC6962"/> provides valuable lessons
      for VAP design.  CT demonstrated that append-only, Merkle-tree-based
      logs can achieve widespread deployment, but also revealed challenges
      that VAP should address.</t>

      <section anchor="ct-successes">
        <name>Successes to Emulate</name>
        <ul>
          <li>Simplicity: CT v1's relative simplicity enabled adoption, while
          CT v2 <xref target="RFC9162"/> saw limited deployment due to increased
          complexity.</li>
          <li>Client enforcement: Browser requirements for CT created strong
          adoption incentives.  Regulatory requirements (EU AI Act) may
          serve a similar function for AI provenance.</li>
          <li>Static serving: Recent CT innovations (e.g., Let's Encrypt's
          Sunlight) demonstrate that logs can be served efficiently from
          static infrastructure, serving millions of proofs using minimal
          resources.  VAP implementations should consider similar
          efficiency optimizations.</li>
        </ul>
      </section>

      <section anchor="ct-challenges">
        <name>Challenges to Address</name>
        <ul>
          <li>Split-view detection: CT's gossip protocols for detecting
          equivocation were never widely deployed.  VAP profiles should
          consider how to detect a Transparency Service presenting
          different views to different parties.</li>
          <li>Ecosystem coordination: CT required coordination across browsers,
          CAs, and log operators.  VAP will similarly require ecosystem
          coordination, which this framework aims to facilitate.</li>
          <li>Log diversity: CT has seen concentration of logs among few
          operators.  VAP profiles should consider whether log diversity
          requirements are needed for their domains.</li>
        </ul>
      </section>

      <section anchor="ct-implications">
        <name>Implications for VAP</name>
        <t>Based on CT experience, VAP profiles should:</t>

        <ul>
          <li>Prioritize operational simplicity over feature completeness.</li>
          <li>Design for static/cacheable proofs where possible.</li>
          <li>Consider enforcement mechanisms that create adoption incentives.</li>
          <li>Document split-view detection and mitigation strategies.</li>
        </ul>
      </section>
    </section>

    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The author thanks the members of the SCITT and RATS working groups
      whose foundational work enables the architectural approach described
      in this document.  The Certificate Transparency ecosystem <xref target="RFC6962"/>
      provided key inspiration for the completeness verification concepts.</t>

      <t>This work benefits from ongoing discussions about AI governance and
      audit requirements in various regulatory contexts, including the
      European Union's AI Act and financial market regulations.</t>
    </section>
  </back>
</rfc>
