This paper analyzes execution-time authorization for autonomous agent systems that perform effectful tool operations under dynamically generated intent. We formalize a governor architecture that introduces Canonical Action Representation (CAR), a mandatory Action Authorization Boundary (AAB), and replay-oriented Decision Provenance Records (DPRs). The work defines trust boundaries, minimal trusted components, and security invariants that ensure non-bypassability, deterministic decision semantics, and tamper-evident authorization logs. We evaluate common attack classes including authorization bypass, policy downgrade, audit tampering, permit replay and forgery, approval spoofing, state confusion, and time-of-check/time-of-use (TOCTOU) conditions. A deterministic replay methodology is provided for incident reconstruction and counterfactual policy evaluation. The paper clarifies what execution-time authorization guarantees, what evidence it produces, and which threat classes remain out of scope.
Building similarity graph...
Analyzing shared references across papers
Loading...
Fatmi Amjad
New Jersey City University
Building similarity graph...
Analyzing shared references across papers
Loading...
Fatmi Amjad (Sat,) studied this question.
www.synapsesocial.com/papers/6980ff19c1c9540dea811cf4 — DOI: https://doi.org/10.5281/zenodo.18438825
Synapse has enriched 5 closely related papers on similar clinical questions. Consider them for comparative context: