<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude"
     category="info"
     docName="draft-kamimura-rats-behavioral-evidence-00"
     ipr="trust200902"
     obsoletes=""
     updates=""
     submissionType="IETF"
     xml:lang="en"
     version="3">

  <front>
    <title abbrev="RATS and Behavioral Evidence">
      On the Relationship Between Remote Attestation and Behavioral
      Evidence Recording
    </title>

    <seriesInfo name="Internet-Draft" value="draft-kamimura-rats-behavioral-evidence-00"/>

    <author fullname="Tokachi Kamimura" initials="T." surname="Kamimura">
      <organization>VeritasChain Standards Organization (VSO)</organization>
      <address>
        <email>kamimura@veritaschain.org</email>
        <uri>https://veritaschain.org</uri>
      </address>
    </author>

    <date year="2026" month="January" day="08"/>

    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>

    <keyword>attestation</keyword>
    <keyword>behavioral evidence</keyword>
    <keyword>verifiable</keyword>
    <keyword>accountability</keyword>
    <keyword>evidence recording</keyword>

    <abstract>
      <t>
        This document provides an informational discussion of the conceptual
        relationship between remote attestation, as defined by the RATS
        (Remote ATtestation ProcedureS) Working Group, and behavioral
        evidence recording mechanisms. It observes that attestation and
        behavioral evidence recording address fundamentally different
        verification questions and can serve as complementary layers in
        comprehensive system accountability frameworks. This document is
        purely descriptive and does not propose any modifications to RATS
        architecture, define new attestation mechanisms, or establish
        normative requirements.
      </t>
    </abstract>

    <note removeInRFC="true" title="Discussion Venues">
      <name>Discussion Venues</name>
      <t>
        Discussion of this document takes place on the Remote ATtestation
        ProcedureS (RATS) Working Group mailing list (rats@ietf.org),
        which is archived at
        <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
      </t>
      <t>
        Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/veritaschain/draft-kamimura-rats-behavioral-evidence"/>.
      </t>
    </note>

  </front>

  <middle>

    <!-- ===== Section 1: Introduction ===== -->
    <section anchor="introduction">
      <name>Introduction</name>

      <t>
        The IETF RATS (Remote ATtestation ProcedureS) Working Group has
        developed a comprehensive architecture for remote attestation,
        enabling Relying Parties to assess the trustworthiness of remote
        systems through cryptographic evidence about their state. This
        attestation capability addresses a fundamental question in
        distributed systems: "Is this system in a trustworthy state?"
      </t>

      <t>
        A related but distinct verification need exists in many operational
        contexts: the ability to verify what actions a system has actually
        performed. This question - "What did the system actually do?" - is
        addressed by cryptographically verifiable audit trails, which record
        system behaviors and decisions in tamper-evident formats.
      </t>

      <t>
        This document observes that these two verification capabilities
        address different aspects of system accountability and can
        conceptually complement each other without overlapping in scope or
        responsibility. The document provides an explanatory framework for
        understanding how attestation and audit trails could relate within
        broader accountability architectures.
      </t>

      <section anchor="document-status">
        <name>Document Status</name>

        <t>This document is purely INFORMATIONAL and NON-NORMATIVE. It:</t>

        <ul>
          <li>Does NOT propose any new RATS mechanisms or architecture changes</li>
          <li>Does NOT modify or extend the RATS architecture as defined in
              <xref target="RFC9334"/></li>
          <li>Does NOT define new protocols, claims, tokens, or data formats</li>
          <li>Does NOT establish normative requirements for any implementation</li>
          <li>Remains fully compatible with and respectful of existing RATS
              concepts and design philosophy</li>
        </ul>

        <t>
          The language in this document uses descriptive terms (MAY, COULD,
          CAN) exclusively to indicate possibilities and observations. This
          document does not use normative requirements language (MUST, SHOULD,
          SHALL) as there are no mandatory behaviors or requirements being
          specified.
        </t>

        <t>
          This document treats verifiable audit trail systems in general terms,
          using VeritasChain Protocol (VCP) <xref target="VCP-SPEC"/> as one
          illustrative example among various possible approaches to
          cryptographic audit logging.
        </t>
      </section>

      <section anchor="motivation">
        <name>Motivation</name>

        <t>
          Several domains increasingly require both trustworthiness assessment
          and behavioral verification:
        </t>

        <ul>
          <li><strong>Financial Services:</strong> Algorithmic trading systems
              face regulatory requirements for both system integrity and
              decision audit trails</li>
          <li><strong>Artificial Intelligence:</strong> AI governance frameworks
              increasingly distinguish between system certification and
              operational logging</li>
          <li><strong>Critical Infrastructure:</strong> Systems controlling
              physical processes may require attestation of their configuration
              alongside records of their actions</li>
        </ul>

        <t>
          Understanding the conceptual relationship between attestation and
          audit trails could help architects design accountability frameworks
          that leverage both capabilities appropriately, without conflating
          their distinct purposes.
        </t>
      </section>
    </section>

    <!-- ===== Section 2: Terminology ===== -->
    <section anchor="terminology">
      <name>Terminology</name>

      <t>
        This document reuses terminology from the RATS Architecture
        <xref target="RFC9334"/> without modification.
        The following terms are used as defined in that document:
      </t>

      <dl>
        <dt>Attester</dt>
        <dd>A role performed by an entity that creates Evidence about
            itself and conveys it to a Verifier.</dd>

        <dt>Verifier</dt>
        <dd>A role performed by an entity that appraises Evidence
            about an Attester.</dd>

        <dt>Relying Party</dt>
        <dd>A role performed by an entity that uses Attestation
            Results to make authorization decisions.</dd>

        <dt>Evidence</dt>
        <dd>Information about an Attester's state, generated by the
            Attester.</dd>

        <dt>Attestation Results</dt>
        <dd>Output produced by a Verifier, indicating the
            trustworthiness of an Attester.</dd>

        <dt>Claims</dt>
        <dd>Assertions about characteristics of an Attester.</dd>

        <dt>Reference Values</dt>
        <dd>Expected values against which Evidence is compared.</dd>
      </dl>

      <t>
        The following terms are used in this document to describe audit
        trail concepts in general terms:
      </t>

      <t>
        <strong>Note on "Audit" Terminology:</strong> The term "audit" in
        this document refers solely to post-hoc examination of recorded
        system behavior. It does not imply regulatory auditing, compliance
        verification, or financial auditing in any jurisdiction-specific
        sense. This usage is consistent with general systems engineering
        terminology (e.g., "audit log") rather than domain-specific
        compliance frameworks.
      </t>

      <dl>
        <dt>Audit Event</dt>
        <dd>A recorded occurrence representing a discrete action,
            decision, or state change in a system. Not to be confused with
            RATS Evidence, which describes system state rather than behavior.</dd>

        <dt>Audit Trail</dt>
        <dd>A chronologically ordered sequence of Audit Events
            that can be cryptographically verified for integrity and
            authenticity.</dd>

        <dt>Behavioral Evidence</dt>
        <dd>Records of what a system has done, as distinct
            from Evidence about what state a system is in. This term is used
            to distinguish audit records from RATS Evidence.</dd>
      </dl>
    </section>

    <!-- ===== Section 3: Conceptual Layering ===== -->
    <section anchor="conceptual-layering">
      <name>Conceptual Layering</name>

      <t>
        This section describes an observational framework for understanding
        how attestation and audit trails could conceptually relate as
        distinct layers of system accountability.
      </t>

      <section anchor="attestation-layer">
        <name>Attestation Layer (RATS)</name>

        <t>
          The RATS architecture addresses trustworthiness assessment through
          remote attestation. At its core, attestation answers questions about
          system state:
        </t>

        <ul>
          <li>Is the system's software configuration as expected?</li>
          <li>Is the system running on genuine, uncompromised hardware?</li>
          <li>Does the system's current state match known-good reference values?</li>
          <li>Can the system's identity and configuration be cryptographically
              verified?</li>
        </ul>

        <t>
          These questions are fundamentally about the properties and
          characteristics of a system at a point in time or across a
          measurement period. The RATS architecture provides mechanisms for
          generating, conveying, and appraising Evidence that enables Relying
          Parties to make trust decisions about Attesters.
        </t>

        <t>Key characteristics of attestation as defined by RATS:</t>

        <ul>
          <li>Focuses on system state and configuration</li>
          <li>Enables trust decisions before or during interactions</li>
          <li>Produces Attestation Results for Relying Party consumption</li>
          <li>Relies on hardware roots of trust where available</li>
          <li>Addresses the question: "Can I trust this system?"</li>
        </ul>
      </section>

      <section anchor="behavioral-evidence-layer">
        <name>Behavioral Evidence Layer (Audit Trails)</name>

        <t>
          Cryptographically verifiable audit trails address a different
          category of verification need. Rather than assessing system state,
          audit trails record what a system has done:
        </t>

        <ul>
          <li>What decisions did an algorithm make?</li>
          <li>What actions did the system execute?</li>
          <li>What inputs led to what outputs?</li>
          <li>What was the sequence and timing of operations?</li>
        </ul>

        <t>
          These questions are fundamentally about system behavior over time.
          Verifiable audit trails could provide mechanisms for recording,
          preserving, and proving the integrity of behavioral records, enabling
          after-the-fact verification of system actions.
        </t>

        <t>Key characteristics of audit trail systems (in general terms):</t>

        <ul>
          <li>Focus on system behavior and decisions</li>
          <li>Enable verification after events have occurred</li>
          <li>Produce verifiable records for auditors, regulators, or other
              parties</li>
          <li>May rely on cryptographic structures such as hash chains, Merkle
              trees, or append-only logs</li>
          <li>Address the question: "What did this system do?"</li>
        </ul>

        <t>
          As an illustrative example, VCP <xref target="VCP-SPEC"/> defines
          audit trails using three integrity layers: event integrity (hashing),
          structural integrity (Merkle trees), and external verifiability
          (digital signatures and anchoring). Other audit trail systems could
          employ different but analogous mechanisms to achieve similar goals.
        </t>
      </section>

      <section anchor="separation-of-concerns">
        <name>Separation of Concerns</name>

        <t>
          The distinction between attestation and audit trails can be
          understood as a separation of concerns:
        </t>

        <table>
          <name>Conceptual Comparison of Attestation and Audit Trails</name>
          <thead>
            <tr>
              <th>Aspect</th>
              <th>Attestation (RATS)</th>
              <th>Audit Trails</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td>Primary Question</td>
              <td>Is this trustworthy?</td>
              <td>What happened?</td>
            </tr>
            <tr>
              <td>Focus</td>
              <td>System state</td>
              <td>System behavior</td>
            </tr>
            <tr>
              <td>Temporal Scope</td>
              <td>Point-in-time or measurement period</td>
              <td>Historical record</td>
            </tr>
            <tr>
              <td>Primary Consumer</td>
              <td>Relying Party</td>
              <td>Auditor, Regulator</td>
            </tr>
            <tr>
              <td>Trust Question</td>
              <td>Should I interact?</td>
              <td>Did it behave correctly?</td>
            </tr>
          </tbody>
        </table>

        <t>
          This separation suggests that attestation and audit trails could
          serve as complementary layers rather than alternatives. A system
          could potentially be subject to both attestation (verifying its
          trustworthy state) and audit logging (recording its subsequent
          behavior), with neither capability substituting for the other.
        </t>
      </section>
    </section>

    <!-- ===== Section 4: Relationship ===== -->
    <section anchor="relationship">
      <name>Relationship Between Attestation Claims and Audit Evidence</name>

      <section anchor="complementary-questions">
        <name>Complementary Questions</name>

        <t>
          When viewed together, attestation and audit trails could address a
          more complete accountability picture:
        </t>

        <dl>
          <dt>Attestation (Before/During):</dt>
          <dd>"This trading system's software is the certified version, running
              on genuine hardware, with approved configuration."</dd>

          <dt>Audit Trail (After):</dt>
          <dd>"This trading system generated signal X at time T1, submitted
              order Y at time T2, and received execution confirmation Z at
              time T3."</dd>
        </dl>

        <t>Neither layer fully substitutes for the other:</t>

        <ul>
          <li>A system could pass attestation but subsequently behave in
              unexpected ways that would only be visible through audit records</li>
          <li>A system could maintain a complete audit trail while itself being
              compromised in ways that attestation might detect</li>
        </ul>

        <t>
          The combination could potentially provide stronger accountability
          than either mechanism alone.
        </t>
      </section>

      <section anchor="temporal-considerations">
        <name>Temporal Considerations</name>

        <t>
          Attestation and audit trails may operate on different temporal
          rhythms:
        </t>

        <dl>
          <dt>Attestation Patterns:</dt>
          <dd>
            <ul>
              <li>At system boot or initialization</li>
              <li>Periodically during operation</li>
              <li>On-demand when a Relying Party requests</li>
            </ul>
          </dd>

          <dt>Audit Trail Patterns:</dt>
          <dd>
            <ul>
              <li>Continuously, as events occur</li>
              <li>At varying granularities depending on event significance</li>
              <li>With periodic integrity commitments (e.g., Merkle root
                  anchoring)</li>
            </ul>
          </dd>
        </dl>

        <t>
          A conceptual integration could involve attestation confirming system
          integrity at key moments, while audit trails continuously record
          behavior between those moments. This temporal complementarity means
          neither mechanism creates gaps that the other cannot fill, but
          together they could provide comprehensive temporal coverage.
        </t>
      </section>

      <section anchor="trust-anchors">
        <name>Trust Anchors</name>

        <t>
          Both attestation and audit trails ultimately rely on trust anchors,
          though potentially different ones:
        </t>

        <dl>
          <dt>Attestation Trust Anchors:</dt>
          <dd>
            <ul>
              <li>Hardware roots of trust (TPM, TEE)</li>
              <li>Endorsement keys and certificates</li>
              <li>Reference value providers</li>
            </ul>
          </dd>

          <dt>Audit Trail Trust Anchors:</dt>
          <dd>
            <ul>
              <li>Signing keys for audit records</li>
              <li>External anchoring mechanisms (transparency logs, timestamps)</li>
              <li>Verifier infrastructure for inclusion proofs</li>
            </ul>
          </dd>
        </dl>

        <t>
          In some deployment scenarios, these trust anchors could overlap or
          share infrastructure. For example, a hardware security module used
          as an attestation root of trust could potentially also sign audit
          trail records. However, this document does not prescribe any
          particular trust anchor arrangement.
        </t>
      </section>
    </section>

    <!-- ===== Section 5: Example Flow ===== -->
    <section anchor="example-flow">
      <name>Example Conceptual Flow</name>

      <t>
        This section provides a purely illustrative, non-normative example
        of how attestation and audit trails could conceptually complement
        each other in a hypothetical deployment. This example does not
        define any protocol or establish any requirements.
      </t>

      <t>Consider a hypothetical automated trading system:</t>

      <dl>
        <dt>Phase 1: System Startup</dt>
        <dd>
          The trading system boots and undergoes remote attestation. A
          Verifier confirms that the system's software, configuration, and
          hardware environment match expected reference values. A Relying
          Party (such as an exchange) receives Attestation Results and
          permits the system to begin trading operations.
        </dd>

        <dt>Phase 2: Operational Period</dt>
        <dd>
          During trading operations, the system generates audit events for
          each significant action: signal generation, order submission,
          execution acknowledgment, risk parameter changes. These events
          are recorded in a cryptographically verifiable audit trail,
          with periodic integrity anchoring.
        </dd>

        <dt>Phase 3: Periodic Re-Attestation</dt>
        <dd>
          At configured intervals, the system may undergo re-attestation
          to confirm its state has not drifted. Audit trail entries
          created between attestation events provide behavioral evidence
          for that period.
        </dd>

        <dt>Phase 4: Post-Hoc Verification</dt>
        <dd>
          An auditor later wishes to verify the system's behavior during
          a specific time window. The auditor can:
          (a) Check that valid Attestation Results existed for the relevant
              period, confirming the system was in a trustworthy state;
          (b) Verify the audit trail for that period, confirming what
              actions the system actually took;
          (c) Correlate both to form a comprehensive accountability view.
        </dd>
      </dl>

      <t>
        This example is purely conceptual and illustrative. Actual
        deployments would involve specific technical decisions not
        addressed in this document.
      </t>
    </section>

    <!-- ===== Section 6: Non-Goals ===== -->
    <section anchor="non-goals">
      <name>Non-Goals and Explicit Out-of-Scope Items</name>

      <t>
        To maintain clarity about this document's limited scope, the
        following items are explicitly out of scope and are NOT addressed:
      </t>

      <t>This document does NOT:</t>

      <ul>
        <li>Propose any modifications to the RATS architecture</li>
        <li>Define any new attestation mechanisms, Evidence formats, or
            Attestation Result structures</li>
        <li>Specify any protocol for connecting attestation and audit trails</li>
        <li>Define any new claims, tokens, or data structures</li>
        <li>Establish normative requirements for either attestation or
            audit trail implementations</li>
        <li>Mandate any particular audit trail format or mechanism</li>
        <li>Suggest that RATS should incorporate audit trail capabilities</li>
        <li>Propose work items for the RATS Working Group</li>
        <li>Define interoperability requirements between attestation and
            audit systems</li>
        <li>Specify trust relationships or delegation models</li>
      </ul>

      <t>
        The purpose of this document is solely to observe and explain the
        conceptual relationship between attestation and audit trails as
        distinct but potentially complementary verification layers. Any
        technical integration or standardization work would require separate
        documents with appropriate community review.
      </t>
    </section>

    <!-- ===== Section 7: Security Considerations ===== -->
    <section anchor="security-considerations">
      <name>Security Considerations</name>

      <t>
        This document is purely informational and does not define any
        protocols or mechanisms. Therefore, it does not introduce new
        security considerations beyond those already present in the
        referenced specifications.
      </t>

      <t>
        The following observations may be relevant to deployments that
        consider both attestation and audit trails:
      </t>

      <dl>
        <dt>Attestation Security:</dt>
        <dd>
          Security considerations for remote attestation are thoroughly
          addressed in <xref target="RFC9334"/>. These
          considerations remain unchanged by the conceptual observations
          in this document.
        </dd>

        <dt>Audit Trail Security:</dt>
        <dd>
          <t>Cryptographically verifiable audit trails face their own security
          considerations, including:</t>
          <ul>
            <li>Key management for signing audit records</li>
            <li>Protection against selective omission of events</li>
            <li>Integrity of external anchoring mechanisms</li>
            <li>Privacy considerations for sensitive behavioral data</li>
          </ul>
        </dd>

        <dt>Potential Interactions:</dt>
        <dd>
          <t>If both attestation and audit trails are deployed together,
          architects could consider:</t>
          <ul>
            <li>Whether audit trail signing keys are themselves subject to
                attestation</li>
            <li>Whether audit trail infrastructure is included in attestation
                measurements</li>
            <li>How trust is established across both layers</li>
          </ul>
        </dd>

        <dt>Inter-Layer Trust Model:</dt>
        <dd>
          <t>Attestation and behavioral evidence recording operate at different
          temporal granularities, creating distinct trust validation points:</t>
          <ul>
            <li>Attestation establishes trust at discrete moments (boot, periodic
                re-attestation, on-demand challenges)</li>
            <li>Behavioral evidence provides continuous records between attestation
                events</li>
            <li>A system could pass attestation validation yet subsequently
                exhibit unexpected behavior detectable only through behavioral
                records</li>
            <li>Conversely, a system could maintain complete behavioral records
                while being compromised in ways that attestation might detect</li>
          </ul>
          <t>The combination of both mechanisms could provide defense-in-depth,
          but architects should consider the trust assumptions and failure
          modes of each layer independently.</t>
        </dd>

        <dt>Key Separation:</dt>
        <dd>
          <t>Deployments using both attestation and behavioral evidence recording
          could benefit from separating cryptographic keys used for each purpose.
          Attestation keys (bound to hardware roots of trust) and behavioral
          evidence signing keys (potentially in separate security domains) may
          have different lifecycle, rotation, and compromise-response requirements.</t>
        </dd>
      </dl>

      <t>
        This document does not mandate any particular approach to these
        considerations, which would depend on specific deployment contexts
        and threat models.
      </t>

      <t>
        This document does not alter the RATS threat model, and introduces
        no new attack surfaces beyond those already considered by existing
        attestation and logging mechanisms.
      </t>
    </section>

    <!-- ===== Section 8: IANA Considerations ===== -->
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>

      <t>This document has no IANA actions.</t>
    </section>

  </middle>

  <back>

    <references>
      <name>References</name>

      <references>
        <name>Normative References</name>

        <reference anchor="RFC9334" target="https://www.rfc-editor.org/info/rfc9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author initials="H." surname="Birkholz" fullname="Henk Birkholz"/>
            <author initials="D." surname="Thaler" fullname="Dave Thaler"/>
            <author initials="M." surname="Richardson" fullname="Michael Richardson"/>
            <author initials="N." surname="Smith" fullname="Ned Smith"/>
            <author initials="W." surname="Pan" fullname="Wei Pan"/>
            <date month="January" year="2023"/>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>

      </references>

      <references>
        <name>Informative References</name>

        <reference anchor="I-D.ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <author initials="H." surname="Birkholz" fullname="Henk Birkholz"/>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud"/>
            <author initials="C." surname="Fournet" fullname="Cedric Fournet"/>
            <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande"/>
            <author initials="S." surname="Lasker" fullname="Steve Lasker"/>
            <date/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture"/>
        </reference>

        <reference anchor="I-D.ietf-rats-reference-interaction-models">
          <front>
            <title>Reference Interaction Models for Remote Attestation Procedures</title>
            <author initials="H." surname="Birkholz" fullname="Henk Birkholz"/>
            <author initials="M." surname="Eckel" fullname="Michael Eckel"/>
            <author initials="W." surname="Pan" fullname="Wei Pan"/>
            <author initials="E." surname="Voit" fullname="Eric Voit"/>
            <date/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-reference-interaction-models"/>
        </reference>

        <reference anchor="RFC6962" target="https://www.rfc-editor.org/info/rfc6962">
          <front>
            <title>Certificate Transparency</title>
            <author initials="B." surname="Laurie" fullname="Ben Laurie"/>
            <author initials="A." surname="Langley" fullname="Adam Langley"/>
            <author initials="E." surname="Kasper" fullname="Emilia Kasper"/>
            <date month="June" year="2013"/>
          </front>
          <seriesInfo name="RFC" value="6962"/>
          <seriesInfo name="DOI" value="10.17487/RFC6962"/>
        </reference>

        <reference anchor="RFC9162" target="https://www.rfc-editor.org/info/rfc9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author initials="B." surname="Laurie" fullname="Ben Laurie"/>
            <author initials="E." surname="Messeri" fullname="Eran Messeri"/>
            <author initials="R." surname="Stradling" fullname="Rob Stradling"/>
            <date month="December" year="2021"/>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>

        <reference anchor="VCP-SPEC" target="https://veritaschain.org/spec">
          <front>
            <title>VeritasChain Protocol (VCP) Specification Version 1.1</title>
            <author>
              <organization>VeritasChain Standards Organization</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>

      </references>

    </references>

    <section anchor="acknowledgments" numbered="false">
      <name>Acknowledgments</name>

      <t>
        The author thanks the RATS Working Group for developing the
        comprehensive attestation architecture that enables discussions of
        complementary verification layers. This document builds upon and
        respects the careful design work reflected in the RATS architecture.
      </t>
    </section>

  </back>

</rfc>
