Technical White Paper Joshua K. Cliff, 2026 137 pages · 22 sections · 12 appendices · 47 formal results · CC BY 4.0 Overview Persistent tool-using AI agents require governance over consequential state transitions, not outputs alone. This paper presents Assured Intelligence Systems (AIS), a formal architecture derived from Principal Dynamics that separates representation, memory, planning, action, governance, verification, release, and self-edit into typed layers governed by a single non-compensatory admissibility relation over support, policy, verification, and recovery. The architecture is consequence-scalable: the same governing model instantiates under lightweight profiles for low-stakes advisory deployments and under full hard-gated profiles for high-stakes autonomous systems, with uncertainty-certified admissibility bands bridging deterministic governance logic and probabilistic AI engines. Version 2 adds a conservation-aware monitoring interface. The base architecture is unchanged. The interface exposes design-charge monitoring hooks through which trajectory-level invariant degradation — in support, policy, verification, recovery, memory, planning, calibration, and governance quantities — can be recorded and routed to governance. The full Noether leakage calculus that decomposes invariant loss into structural channels is developed in companion work and is not re-proved here. What the Paper Provides Formal control-plane semantics: typed operational state, route-qualified transitions, four-burden conjunctive admissibility, consequence-scaled assurance profiles, uncertainty-certified admission, and a conservative compiled admission kernel Layered architecture with structural contracts: control surfaces, governance as runtime state, typed receipt families, replayability, rollback and quarantine semantics, and a unified failure atlas recasting major agent failures as inadmissible or unrecoverable transitions Side-effecting execution closure: effect-transaction semantics with terminal-state resolution for write-capable commits, lineage-aware rollback propagation, promotion-scoped memory with quarantine handling, shared-resource lease control, and attestation-bearing release Scale and adaptation results: planning-layer invariance across heuristic through formal world-model planning, product-regime composition for multi-agent delegation with composed bypass-freedom, governed continuous learning, coherence-based anomaly detection, and adaptive threshold governance with a provable governance floor Current-stack applicability: tool-use governance, prompt injection as structural violation, hallucination as support-burden failure, context drift, loop containment, memory poisoning — all mapped onto current LLM-based agent frameworks (MCP, OpenAI Agents SDK, LangGraph) Operational architecture: evaluation structure, deployment and rollback topology, recursive self-edit containment, implementation blueprint, and a validation bundle with 17 defined metrics Conservation-aware monitoring (new in Version 2): design-charge packet, charge-difference vector, charge-leakage accumulator, audit-only and blocking operating modes, conservation-aware evaluation rows, charge-attributed failure records, and charge-aware learning-update promotion Formal Results 47 formal results with proofs: 24 theorems, 21 propositions, 1 corollary, and 1 lemma. Results fall into three categories: Structural contracts (hold by construction when instantiated): governed admissibility preservation, no-bypass, surface completeness, route-legality preservation, receipt completeness, bounded replayability, consequence-scaled admissibility monotonicity, conservativeness of the compiled admission kernel, write-capable execution closure, rollback-ready promotion, and non-interference of audit-only charge monitoring. Robustness and composition results (hold under explicit premises): planning reliability bound, architecture invariance under planning-layer upgrade, receipt-chain completeness, composed bypass-freedom, governed-learning preservation, anomaly-implies-future-support-burden violation, lucid drift, governance-floor preservation, adaptive-threshold stability, and promotion blocking under charge loss. Operational results: governed tool-use, injection detection under governed route update, and admissibility strength. Self-Containment The paper is fully self-contained. Appendix A (Source Basis) states the relationship to the governing framework. Appendix B (Governing Theory Results) provides every mathematical result from Principal Dynamics that is used in the body, with proofs. No access to external documents is required to validate any claim. What Is Not Claimed No deployment, benchmark, or empirical validation is claimed No claim that hallucination is eliminated or recursive self-improvement is solved No claim that current LLMs can fully instantiate metric-based detection No claim that threshold or consequence-score calibration is solved No claim that governance evaluation has zero compute cost No claim that Version 2 design charges have been empirically calibrated, that charge monitoring eliminates failure modes, or that the Noether leakage identity is re-proved here The paper defines the architecture and proves its formal properties; engineering, calibration, and empirical validation are the next stage Related Works Assured Intelligence Systems, Version 1: 10.5281/zenodo.19324243 A Noether-Type Theorem for Admissible Gated Gradient Flows (companion Noether-AI work): 10.5281/zenodo.20112986. Keywords: agentic AI, AI governance, controllable AI, verifiable AI systems, state-transition assurance, multi-agent composition, anomaly detection, adaptive governance, tool-use governance, prompt injection, Principal Dynamics, consequence scaling, admissibility, conservation-aware monitoring, Noether leakage
Building similarity graph...
Analyzing shared references across papers
Loading...
Joshua Cliff Joshua K. Cliff (Thu,) studied this question.
www.synapsesocial.com/papers/6a03cbbe1c527af8f1ecf86b — DOI: https://doi.org/10.5281/zenodo.20122776
Synapse has enriched 5 closely related papers on similar clinical questions. Consider them for comparative context:
Joshua Cliff Joshua K. Cliff
Building similarity graph...
Analyzing shared references across papers
Loading...