|
1 |
| -Open Architecture Working Group |
2 |
| -Internet-Draft |
3 |
| -Intended status: Draft |
4 |
| -Expires: June 1, 2023 |
5 |
| - March 12, 2022 |
6 |
| - |
7 |
| - |
8 |
| - Open Architecture: Methodology for interpreting directed graphs as |
9 |
| - any system architecture |
10 |
| - |
11 |
| -Abstract |
12 |
| - |
13 |
| - This document describes the Open Architecture, aka Alice; a proxy format |
14 |
| - for domain specific representations of architecture. |
15 |
| - |
16 |
| - The Open Architecture is a methodology for intepretation of exisitng |
17 |
| - well established, formats, protocols, and other domain specific |
18 |
| - representations of architecture. We define a methodology for interpreting |
19 |
| - a directed graph representing a system architecture. |
20 |
| - |
21 |
| - We provide implementations which interpret those graphs as software and hardware |
22 |
| - architectures. |
23 |
| - |
24 |
| -Status of This Memo |
25 |
| - |
26 |
| - This Internet-Draft will be submitted in full conformance with the |
27 |
| - provisions of BCP 78 and BCP 79. |
28 |
| - |
29 |
| - This draft will expire on June 1st, 2023. |
30 |
| - |
31 |
| -Table of Contents |
32 |
| - |
33 |
| - 1. Introduction |
34 |
| - 2. References |
35 |
| - |
36 |
| -1. Introduction |
37 |
| - |
38 |
| - The Open Architecture enables hybrid on/off chain smart contacts. |
39 |
| - It does this by incorporating risk management into architecture definition / |
40 |
| - smart contract. Smart contracts with understanding of risk are effectively |
41 |
| - entities making decisions based on models. This allows for mutation in |
42 |
| - implementation while maintaining principles. |
43 |
| - |
44 |
| - The smart contract is able to make its own decisions based on learned |
45 |
| - experience so as to continue to operate until its strategic goals are meet. |
46 |
| - As measured by oracle data ordained from trusted parties as is |
47 |
| - applicable to context. Where chains of trust are established via Peer DIDs |
48 |
| - between entities and data for provenance. Leveraging verifiable credentials |
49 |
| - for review system to measure risk in absence of attestation. |
50 |
| - |
51 |
| -2. References |
52 |
| - |
53 |
| -2.1. Normative References |
54 |
| - |
55 |
| -2.2. Informative References |
56 |
| - |
57 |
| - [alice-reveiw] |
58 |
| - DFFML Authors, "Alice", May 2022, |
59 |
| - <https://github.com/intel/dffml/pulls/1401>. |
60 |
| - |
61 |
| - [living-threat-models] |
62 |
| - John L Whiteman & John S Andersen, "Living Threat Models", June 11th 2022, |
63 |
| - <https://github.com/johnlwhiteman/living-threat-models>. |
| 1 | +Open Architecture |
| 2 | +################# |
| 3 | + |
| 4 | +Version: 0.0.1 |
| 5 | +Date: 2022-04-17 |
| 6 | + |
| 7 | +Status |
| 8 | +****** |
| 9 | + |
| 10 | +Proposed |
| 11 | + |
| 12 | +Description |
| 13 | +*********** |
| 14 | + |
| 15 | +The Open Architecture is a methodology for interpreting directed graphs as |
| 16 | +any system architecture. |
| 17 | + |
| 18 | +Context |
| 19 | +******* |
| 20 | + |
| 21 | +This document describes the Open Architecture; a proxy format for domain |
| 22 | +specific representations of architecture. |
| 23 | + |
| 24 | +The Open Architecture is a methodology for intepretation of exisitng |
| 25 | +well established, formats, protocols, and other domain specific |
| 26 | +representations of architecture. We define a methodology for interpreting |
| 27 | +a directed graph representing a system architecture. |
| 28 | + |
| 29 | +We provide implementations which interpret graphs as software and hardware |
| 30 | +architectures. |
| 31 | + |
| 32 | +The Open Architecture also enables hybrid on/off chain smart contacts. |
| 33 | +It does this by incorporating risk management into architecture definition / |
| 34 | +smart contract. Smart contracts with understanding of risk are effectively |
| 35 | +entities making decisions based on models. This allows for mutation in |
| 36 | +implementation while maintaining principles. |
| 37 | + |
| 38 | +The smart contract is able to make its own decisions based on learned |
| 39 | +experience so as to continue to operate until its strategic goals are meet. |
| 40 | +As measured by oracle data ordained from trusted parties as is |
| 41 | +applicable to context. Where chains of trust are established via Peer DIDs |
| 42 | +between entities and data for provenance. Leveraging verifiable credentials |
| 43 | +for review system to measure risk in absence of attestation. |
| 44 | + |
| 45 | +Intent |
| 46 | +****** |
| 47 | + |
| 48 | +- ``upstream`` MUST be treated as the document itself if the document is a |
| 49 | + domain sepcific architecture or manifest already. |
| 50 | + |
| 51 | +- ``overlay`` MUST be applied to upstream following overlay application process |
| 52 | + describied in [0010-Overlay.rst](https://github.com/intel/dffml/blob/alice/Overlay) if given. |
| 53 | + |
| 54 | +- ``orchestrator`` SHOULD be loaded and inspected for compliance with top level |
| 55 | + system context's policy (sandbox) before execution. |
| 56 | + |
| 57 | +References |
| 58 | +********** |
| 59 | + |
| 60 | +- Living Threat Models |
| 61 | + - John L Whiteman & John S Andersen, "Living Threat Models", June 11th 2022 |
| 62 | + - https://github.com/johnlwhiteman/living-threat-models |
| 63 | +- TODO |
| 64 | + - Add content from discussion thread |
| 65 | + - [docs/arch/alice/discussion/0004/reply_0005.md](https://github.com/intel/dffml/blob/alice/docs/arch/alice/discussion/0004/reply_0005.md) |
| 66 | + - [docs/arch/alice/discussion/0023/reply_0020.md](https://github.com/intel/dffml/blob/alice/docs/arch/alice/discussion/0023/reply_0020.md) |
| 67 | + - [docs/arch/alice/discussion/0023/reply_0022.md](https://github.com/intel/dffml/blob/alice/docs/arch/alice/discussion/0023/reply_0022.md) |
| 68 | + - [docs/arch/alice/discussion/0023/reply_0028.md](https://github.com/intel/dffml/blob/alice/docs/arch/alice/discussion/0023/reply_0028.md) |
| 69 | + - [docs/arch/alice/discussion/0023/reply_0037.md](https://github.com/intel/dffml/blob/alice/docs/arch/alice/discussion/0023/reply_0037.md) |
| 70 | + - [docs/arch/alice/discussion/0023/reply_0040.md](https://github.com/intel/dffml/blob/alice/docs/arch/alice/discussion/0023/reply_0040.md) |
| 71 | + - [docs/arch/alice/discussion/0023/reply_0055.md](https://github.com/intel/dffml/blob/alice/docs/arch/alice/discussion/0023/reply_0055.md) |
| 72 | + - [docs/arch/alice/discussion/0036/reply_0022.md](https://github.com/intel/dffml/blob/alice/docs/arch/alice/discussion/0036/reply_0022.md) |
| 73 | + - [docs/arch/alice/discussion/0036/reply_0045.md](https://github.com/intel/dffml/blob/alice/docs/arch/alice/discussion/0036/reply_0045.md) |
| 74 | + - [docs/arch/alice/discussion/0036/reply_0062.md](https://github.com/intel/dffml/blob/alice/docs/arch/alice/discussion/0036/reply_0062.md) |
| 75 | + - [docs/arch/alice/discussion/0036/reply_0066.md](https://github.com/intel/dffml/blob/alice/docs/arch/alice/discussion/0036/reply_0066.md) |
| 76 | + - [docs/arch/alice/discussion/0036/reply_0067.md](https://github.com/intel/dffml/blob/alice/docs/arch/alice/discussion/0036/reply_0067.md) |
| 77 | + - [docs/arch/alice/discussion/0039/index.md](https://github.com/intel/dffml/blob/alice/docs/arch/alice/discussion/0039/index.md) |
| 78 | + - [docs/tutorials/rolling_alice/0000_architecting_alice/README.md](https://github.com/intel/dffml/blob/alice/docs/tutorials/rolling_alice/0000_architecting_alice/README.md) |
| 79 | + - [docs/tutorials/rolling_alice/0000_forward.md](https://github.com/intel/dffml/blob/alice/docs/tutorials/rolling_alice/0000_forward.md) |
| 80 | + - [docs/tutorials/rolling_alice/0000_preface.md](https://github.com/intel/dffml/blob/alice/docs/tutorials/rolling_alice/0000_preface.md) |
| 81 | + - [docs/tutorials/rolling_alice/README.md](https://github.com/intel/dffml/blob/alice/docs/tutorials/rolling_alice/README.md) |
0 commit comments