Skip to content

KTP-Federation: Trust Federation Specification

"Without federation, each zone is an island. With federation, trust becomes a portable asset that compounds across the network."


At a Glance

Property Value
Status Draft
Version 0.1
Dependencies KTP-Core, KTP-Identity, KTP-Zones
Required By KTP-Governance, KTP-Migration

The Problem

In a fragmented network, an agent must rebuild its reputation from zero every time it enters a new environment. This creates friction and disincentivizes long-term good behavior. Conversely, bad actors can "zone hop" to escape the consequences of their actions.

The Solution: Trust Federation

KTP-Federation allows Blue Zones to establish formal trust relationships. This enables: 1. Portable Reputation: An agent's history in Zone A carries weight in Zone B. 2. Global Accountability: Negative actions in one zone propagate to others. 3. Sovereignty: Each zone retains full control over its own policies while participating in the network.

Federation Models

Direct Partnership. Two zones agree to trust each other directly. Simple and effective for close partners.

graph LR
    A[Zone A] <-->|Trust 0.9| B[Zone B]

Centralized Trust. A central "Hub" zone acts as a trust anchor for multiple "Spoke" zones. Efficient for corporate or government hierarchies.

graph TD
    H[Hub Zone]
    S1[Spoke 1]
    S2[Spoke 2]
    S3[Spoke 3]

    H <-->|1.0| S1
    H <-->|1.0| S2
    H <-->|0.8| S3
    S1 -.->|Via Hub| S2

Decentralized Network. Many zones with direct relationships to each other. No central authority. Trust is calculated via pathfinding.

graph LR
    A[Zone A] --- B[Zone B]
    B --- C[Zone C]
    C --- A
    A --- D[Zone D]
    D --- B

Trust Factor Calculation

When an agent moves from Zone A to Zone B, its effective trust is modified by the Trust Factor (\(T_f\)) between the zones.

\[E_{effective} = E_{base} \times T_f\]

Where: * \(E_{base}\) is the agent's earned trust in its home zone. * \(T_f\) is the negotiated trust level between the zones (0.0 to 1.0).

Trust Propagation

Trust events propagate across the federation network:

  • Forward Propagation: Positive actions increase reputation in federated zones.
  • Backward Propagation: Negative actions (violations) decrease reputation in previously visited zones.

Transitivity Limits

Trust is not infinitely transitive. If Zone A trusts Zone B, and Zone B trusts Zone C, Zone A does not automatically trust Zone C unless explicitly configured.


Federation Agreement

A formal JSON contract specifying trust factors, expiration dates, and dispute resolution protocols.

  • Cross-Zone Attestation: Cryptographic proofs co-signed by multiple Zone Authorities.
  • Trust Decay: External reputation decays unless reinforced by local good behavior.
  • Dispute Resolution: Protocols for handling disagreements between zones.
Related Specifications

Official RFC Document

View Complete RFC Text (ktp-federation.txt)
Kinetic Trust Protocol                                      C. Perkins
Specification Draft                                           NMCITRA
Version: 0.1                                             November 2025


    Kinetic Trust Protocol (KTP) - Trust Federation Specification

Abstract

   This document specifies the Trust Federation system for the Kinetic
   Trust Protocol (KTP). Trust Federation enables portable trust between
   Blue Zones, allowing agents to carry their reputation across zone
   boundaries while maintaining appropriate trust adjustments based on
   zone relationships.

   The specification covers federation models, trust negotiation, cross-
   zone attestations, dispute resolution, and governance of federated
   trust networks.

Status of This Memo

   This document is a draft specification developed by the New Mexico
   Cyber Intelligence & Threat Response Alliance (NMCITRA). It has not
   been submitted to the IETF and does not represent an Internet
   Standard or consensus of any standards body.

   Feedback and contributions are welcome at:
   https://github.com/nmcitra/ktp-rfc

Copyright Notice

   Copyright (c) 2025 Chris Perkins / NMCITRA. This work is licensed
   under the Apache License, Version 2.0.

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . .   2
       1.1.  The Federation Problem . . . . . . . . . . . . . . . .   2
       1.2.  Federation Philosophy  . . . . . . . . . . . . . . . .   3
       1.3.  Requirements Language  . . . . . . . . . . . . . . . .   4
   2.  Terminology  . . . . . . . . . . . . . . . . . . . . . . . .   4
   3.  Federation Models  . . . . . . . . . . . . . . . . . . . . .   6
       3.1.  Bilateral Federation . . . . . . . . . . . . . . . . .   6
       3.2.  Hub Federation . . . . . . . . . . . . . . . . . . . .   7
       3.3.  Mesh Federation  . . . . . . . . . . . . . . . . . . .   8
       3.4.  Hierarchical Federation  . . . . . . . . . . . . . . .   9
   4.  Trust Factor Calculation . . . . . . . . . . . . . . . . . .  10
       4.1.  Base Trust Factor  . . . . . . . . . . . . . . . . . .  10
       4.2.  Dynamic Trust Factor . . . . . . . . . . . . . . . . .  11
       4.3.  Trust Factor Decay . . . . . . . . . . . . . . . . . .  12
       4.4.  Minimum Trust Floor  . . . . . . . . . . . . . . . . .  13
   5.  Federation Agreements  . . . . . . . . . . . . . . . . . . .  14
       5.1.  Agreement Structure  . . . . . . . . . . . . . . . . .  14
       5.2.  Negotiation Protocol . . . . . . . . . . . . . . . . .  16
       5.3.  Agreement Lifecycle  . . . . . . . . . . . . . . . . .  18
   6.  Cross-Zone Attestations  . . . . . . . . . . . . . . . . . .  19
       6.1.  Attestation Types  . . . . . . . . . . . . . . . . . .  19
       6.2.  Co-Signature Requirements  . . . . . . . . . . . . . .  20
       6.3.  Attestation Verification . . . . . . . . . . . . . . .  21
       6.4.  Attestation Chain  . . . . . . . . . . . . . . . . . .  22
   7.  Trust Propagation  . . . . . . . . . . . . . . . . . . . . .  23
       7.1.  Forward Propagation  . . . . . . . . . . . . . . . . .  23
       7.2.  Backward Propagation . . . . . . . . . . . . . . . . .  24
       7.3.  Propagation Limits . . . . . . . . . . . . . . . . . .  25
   8.  Federation Events  . . . . . . . . . . . . . . . . . . . . .  26
       8.1.  Zone Join  . . . . . . . . . . . . . . . . . . . . . .  26
       8.2.  Zone Leave . . . . . . . . . . . . . . . . . . . . . .  27
       8.3.  Trust Factor Change  . . . . . . . . . . . . . . . . .  28
       8.4.  Emergency Severance  . . . . . . . . . . . . . . . . .  29
   9.  Dispute Resolution . . . . . . . . . . . . . . . . . . . . .  30
       9.1.  Dispute Types  . . . . . . . . . . . . . . . . . . . .  30
       9.2.  Resolution Process . . . . . . . . . . . . . . . . . .  31
       9.3.  Arbitration  . . . . . . . . . . . . . . . . . . . . .  32
   10. Federation Governance  . . . . . . . . . . . . . . . . . . .  33
       10.1. Governance Bodies  . . . . . . . . . . . . . . . . . .  33
       10.2. Policy Coordination  . . . . . . . . . . . . . . . . .  34
       10.3. Standards Evolution  . . . . . . . . . . . . . . . . .  35
   11. Security Considerations  . . . . . . . . . . . . . . . . . .  36
   12. References . . . . . . . . . . . . . . . . . . . . . . . . .  37
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . .  38

1.  Introduction

   A single Blue Zone provides physics-based authorization for agents
   within its boundaries. But the real power of KTP emerges when zones
   are connected--when trust earned in one zone carries weight in
   another.

   Trust Federation is the protocol by which zones establish trust
   relationships, negotiate trust factors, and enable portable
   reputation across the emerging network of Blue Zones.

1.1.  The Federation Problem

   Without federation, each zone is an island:

   -  Agents must rebuild trust from zero in each zone
   -  Good behavior in Zone A provides no benefit in Zone B
   -  Bad actors can "zone hop" to escape consequences
   -  The network effect of trust cannot emerge

   With federation:

   -  Trust is portable between federated zones
   -  Good behavior creates compound value
   -  Bad actors are tracked across zone boundaries
   -  Network effects create positive sum dynamics

   The challenge is: how do zones agree on trust relationships when they
   may have different policies, different risk tolerances, and different
   governance structures?

1.2.  Federation Philosophy

   KTP Federation is built on these principles:

   1. Sovereignty: Each zone retains full sovereignty over its internal
      governance. Federation does not require policy harmonization.

   2. Reciprocity: Trust relationships are reciprocal by default. If
      Zone A trusts Zone B at factor 0.8, Zone B trusts Zone A at 0.8
      unless explicitly negotiated otherwise.

   3. Transitivity Limits: Trust is not infinitely transitive. If Zone A
      trusts Zone B, and Zone B trusts Zone C, Zone A does not
      automatically trust Zone C.

   4. Degradation Safety: Federation failures degrade gracefully. If
      trust cannot be verified, agents are treated as unfederated, not
      blocked entirely.

   5. Transparency: Federation relationships are public. Agents can see
      which zones are federated before choosing to participate.

1.3.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 [RFC2119] [RFC8174].

2.  Terminology

   Bilateral Federation: A direct trust relationship between exactly two
   zones.

   Cross-Zone Attestation: An attestation that is co-signed by Trust
   Oracles from multiple zones, creating portable proof of behavior.

   Federation Agreement: A formal contract between zones specifying
   trust factors, obligations, and dispute resolution procedures.

   Federation Hub: A zone that serves as a central trust anchor for
   multiple spoke zones.

   Federation Mesh: A network of zones with many-to-many trust
   relationships.

   Forward Propagation: The process by which positive trust events in
   one zone increase an agent's reputation in federated zones.

   Backward Propagation: The process by which negative trust events in
   one zone decrease an agent's reputation in previously visited zones.

   Trust Factor: A multiplier (0.0 to 1.0) applied to an agent's E_base
   when crossing from one zone to another.

   Trust Path: The chain of federated zones through which trust is
   calculated for a multi-hop agent journey.

3.  Federation Models

   Zones can federate using several models, each with different
   characteristics.

3.1.  Bilateral Federation

   The simplest model: two zones agree to trust each other.

   Characteristics:

   -  Direct relationship between two zones
   -  Single trust factor per direction
   -  Simple to establish and maintain
   -  Does not scale to many zones

   Structure:

      +----------+                     +----------+
      |  Zone A  |<--- Trust (0.9) --->|  Zone B  |
      +----------+                     +----------+

   Use cases:

   -  Two organizations with partnership
   -  Parent company and subsidiary
   -  Vendor and customer relationship

   Agreement example:

      {
        "federation_type": "bilateral",
        "parties": [
          { "zone_id": "zone-blue-corp-a", "name": "Corp A" },
          { "zone_id": "zone-blue-corp-b", "name": "Corp B" }
        ],
        "trust_factors": {
          "a_to_b": 0.9,
          "b_to_a": 0.9
        },
        "effective_date": "2025-01-01",
        "expiration_date": "2026-01-01",
        "auto_renewal": true
      }

3.2.  Hub Federation

   A central zone acts as trust anchor for multiple spoke zones.

   Characteristics:

   -  One hub zone, multiple spoke zones
   -  Spokes trust hub fully (factor 1.0)
   -  Spokes trust each other via hub
   -  Hub has significant responsibility
   -  Efficient for organizational hierarchies

   Structure:

                    +----------+
                    |   Hub    |
                    +----------+
                   /     |     \
                  /      |      \
          +------+  +------+  +------+
          |Spoke1|  |Spoke2|  |Spoke3|
          +------+  +------+  +------+

   Trust calculation (Spoke1 to Spoke2):

      Trust = Spoke1_to_Hub * Hub_to_Spoke2
      Trust = 1.0 * 1.0 = 1.0

   Use cases:

   -  Corporate zone hierarchy
   -  Government agency federation
   -  Industry consortium

   Agreement example:

      {
        "federation_type": "hub",
        "hub": {
          "zone_id": "zone-blue-headquarters",
          "name": "Corporate HQ"
        },
        "spokes": [
          { "zone_id": "zone-blue-division-a", "trust_factor": 1.0 },
          { "zone_id": "zone-blue-division-b", "trust_factor": 1.0 },
          { "zone_id": "zone-cyan-subsidiary", "trust_factor": 0.8 }
        ],
        "spoke_to_spoke": "via_hub"
      }

3.3.  Mesh Federation

   Many zones with direct relationships to each other.

   Characteristics:

   -  Multiple bilateral relationships
   -  No central authority
   -  Complex trust calculation
   -  Most flexible but hardest to manage

   Structure:

      +--------+-------+--------+
      |        |       |        |
      v        v       v        v
      +------+  +------+  +------+  +------+
      |Zone A|--|Zone B|--|Zone C|--|Zone D|
      +------+  +------+  +------+  +------+
      |              |         |         |
      +--------------+---------+---------+

   Trust calculation requires path finding:

   -  Direct path: Use direct trust factor
   -  Multi-hop path: Multiply factors along path
   -  Multiple paths: Use highest trust path

   Use cases:

   -  Industry peer networks
   -  Research institution networks
   -  Decentralized ecosystems

   Agreement example:

      {
        "federation_type": "mesh",
        "zone_id": "zone-blue-university-a",
        "peers": [
          {
            "zone_id": "zone-blue-university-b",
            "trust_factor": 0.95,
            "relationship": "research_partner"
          },
          {
            "zone_id": "zone-blue-university-c",
            "trust_factor": 0.90,
            "relationship": "consortium_member"
          },
          {
            "zone_id": "zone-cyan-startup-x",
            "trust_factor": 0.70,
            "relationship": "incubator_graduate"
          }
        ]
      }

3.4.  Hierarchical Federation

   Tree structure with inheritance of trust relationships.

   Characteristics:

   -  Parent-child zone relationships
   -  Trust inherited down hierarchy
   -  Children can have additional peer relationships
   -  Natural for organizational structures

   Structure:

                    +----------+
                    |   Root   |
                    +----------+
                   /            \
           +------+              +------+
           |Tier 1|              |Tier 1|
           +------+              +------+
          /        \            /        \
      +----+    +----+      +----+    +----+
      |Tier|    |Tier|      |Tier|    |Tier|
      | 2  |    | 2  |      | 2  |    | 2  |
      +----+    +----+      +----+    +----+

   Trust rules:

   -  Parent trusts all descendants at factor 1.0
   -  Child trusts parent at factor 1.0
   -  Siblings trust each other at parent's discretion
   -  Cross-branch trust calculated via common ancestor

   Use cases:

   -  Government hierarchies
   -  Multi-national corporations
   -  Franchise networks

4.  Trust Factor Calculation

4.1.  Base Trust Factor

   The base trust factor is the starting point for cross-zone trust
   calculation:

      E_base_target = E_base_source * trust_factor

   Trust factor ranges:

   -  1.0: Full trust (same as own zone)
   -  0.8-0.99: High trust (close partner)
   -  0.5-0.79: Moderate trust (known zone)
   -  0.3-0.49: Low trust (minimal relationship)
   -  0.0-0.29: Very low trust (untrusted zone)
   -  0.0: No trust (effectively unfederated)

   Example calculation:

      Agent with E_base = 85 in Zone A
      Zone A to Zone B trust factor = 0.8
      E_base in Zone B = 85 * 0.8 = 68

4.2.  Dynamic Trust Factor

   Trust factors can be adjusted dynamically based on:

   1. Recent behavior of agents from the zone
   2. Zone's security posture
   3. Federation agreement compliance
   4. Incident history

   Dynamic adjustment formula:

      effective_trust_factor = base_trust_factor * behavior_modifier

   Where behavior_modifier is calculated from:

      behavior_modifier = 1.0 - (negative_events * penalty)
                              + (positive_events * bonus)

   Clamped to range [0.5 * base, 1.0 * base] to prevent extreme swings.

4.3.  Trust Factor Decay

   Trust factors naturally decay over time without positive
   reinforcement:

      trust_factor(t) = trust_factor(t0) * decay_rate ^ (t - t0)

   Where:

   -  t0: Time of last federation activity
   -  t: Current time
   -  decay_rate: Typically 0.99 per day

   This ensures that inactive federations don't maintain full trust
   indefinitely. Regular cross-zone traffic maintains trust; inactive
   relationships gradually return to baseline.

   Decay is reset by:

   -  Successful agent crossings
   -  Cross-zone attestations
   -  Federation agreement renewal

4.4.  Minimum Trust Floor

   To prevent trust from decaying to zero, federations MAY specify a
   minimum trust floor:

      effective_trust_factor = max(calculated_factor, floor)

   Typical floors:

   -  Bilateral: 0.5 (maintain meaningful relationship)
   -  Hub: 0.8 (maintain organizational trust)
   -  Mesh: 0.3 (maintain basic connectivity)

   If trust falls below floor despite decay protection, this indicates a
   relationship problem requiring human intervention.

5.  Federation Agreements

5.1.  Agreement Structure

   A Federation Agreement is a formal contract between zones:

      {
        "agreement_id": "fed-agree-uuid-12345",
        "agreement_version": "1.0",
        "created": "2025-01-01T00:00:00Z",
        "effective": "2025-01-15T00:00:00Z",
        "expires": "2026-01-15T00:00:00Z",

        "parties": [
          {
            "zone_id": "zone-blue-corp-a",
            "legal_entity": "Corporation A Inc.",
            "jurisdiction": "US-DE",
            "signing_authority": "CISO",
            "signature": "sig:zone-a:abc123..."
          },
          {
            "zone_id": "zone-blue-corp-b",
            "legal_entity": "Corporation B Ltd.",
            "jurisdiction": "UK",
            "signing_authority": "Head of Security",
            "signature": "sig:zone-b:def456..."
          }
        ],

        "trust_terms": {
          "base_trust_factor": 0.85,
          "asymmetric": false,
          "dynamic_adjustment": true,
          "decay_rate": 0.99,
          "floor": 0.5,
          "ceiling": 0.95
        },

        "obligations": {
          "ktp_version": "1.0",
          "min_zone_type": "blue",
          "flight_recorder": "required",
          "audit_access": "quarterly",
          "incident_notification": "24_hours",
          "soul_enforcement": "required"
        },

        "data_handling": {
          "cross_zone_attestations": true,
          "trajectory_sharing": "on_request",
          "resilience_ledger_sync": "daily"
        },

        "dispute_resolution": {
          "negotiation_period_days": 30,
          "mediation": "recommended",
          "arbitration": "JAMS",
          "arbitration_jurisdiction": "US-NY",
          "governing_law": "US-NY"
        },

        "termination": {
          "notice_period_days": 90,
          "immediate_termination_causes": [
            "security_breach",
            "agreement_violation",
            "insolvency"
          ]
        }
      }

5.2.  Negotiation Protocol

   Federation agreements are negotiated through a structured protocol:

   Phase 1: Discovery

   -  Zones exchange public information
   -  Verify zone registration and governance
   -  Assess compatibility (zone types, policies)

   Phase 2: Proposal

   -  Initiating zone sends federation proposal
   -  Proposal includes suggested terms
   -  Receiving zone acknowledges receipt

   Phase 3: Negotiation

   -  Zones exchange counter-proposals
   -  Terms are negotiated
   -  Legal review occurs

   Phase 4: Agreement

   -  Final terms are documented
   -  Signing authorities approve
   -  Cryptographic signatures applied

   Phase 5: Activation

   -  Agreement is published (if public federation)
   -  Trust Oracles are configured
   -  Federation becomes active

   Protocol messages:

      // Proposal
      {
        "message_type": "federation_proposal",
        "from_zone": "zone-blue-corp-a",
        "to_zone": "zone-blue-corp-b",
        "proposal_id": "prop-uuid-12345",
        "proposed_terms": { ... },
        "valid_until": "2025-02-01T00:00:00Z"
      }

      // Counter-proposal
      {
        "message_type": "federation_counter",
        "from_zone": "zone-blue-corp-b",
        "to_zone": "zone-blue-corp-a",
        "proposal_id": "prop-uuid-12345",
        "counter_id": "counter-uuid-67890",
        "modified_terms": { ... },
        "accepted_terms": [ ... ],
        "rejected_terms": [ ... ]
      }

      // Acceptance
      {
        "message_type": "federation_accept",
        "from_zone": "zone-blue-corp-a",
        "to_zone": "zone-blue-corp-b",
        "proposal_id": "prop-uuid-12345",
        "final_agreement": { ... },
        "signature": "sig:zone-a:xyz789..."
      }

5.3.  Agreement Lifecycle

   Federation agreements follow a lifecycle:

   1. Draft: Agreement being negotiated
   2. Pending: Agreement signed, awaiting activation
   3. Active: Agreement in force
   4. Suspended: Temporarily inactive (dispute, incident)
   5. Expiring: Within notice period of expiration
   6. Expired: Past expiration date
   7. Terminated: Ended before expiration

   State transitions:

      Draft --> Pending --> Active --> Expiring --> Expired
                             |
                             +--> Suspended --> Active
                             |
                             +--> Terminated

6.  Cross-Zone Attestations

6.1.  Attestation Types

   Cross-zone attestations provide portable proof of behavior:

   Passage Attestation:

   -  Issued when agent successfully crosses zone boundary
   -  Proves agent met entry requirements
   -  Lightweight, high volume

   Behavior Attestation:

   -  Issued periodically for agents operating in zone
   -  Summarizes behavior over time period
   -  Medium weight, regular cadence

   Exit Attestation:

   -  Issued when agent leaves zone
   -  Comprehensive summary of zone tenure
   -  Detailed, one per zone visit

   Crisis Attestation:

   -  Issued for behavior during high-stress periods
   -  Carries extra weight for Proof of Resilience
   -  Rare, high value

6.2.  Co-Signature Requirements

   Cross-zone attestations require co-signatures for maximum
   portability:

   Single-zone attestation (limited portability):

   -  Signed by issuing zone's Oracle only
   -  Accepted by federated zones at reduced weight
   -  Weight reduction: 20%

   Dual-zone attestation (standard):

   -  Signed by both source and destination zone Oracles
   -  Full weight in both zones and their federations
   -  Standard for zone crossings

   Multi-zone attestation (premium):

   -  Signed by three or more zone Oracles
   -  Full weight across all signing zones' federations
   -  Used for high-value agents

   Co-signature format:

      {
        "attestation_id": "att-uuid-12345",
        "attestation_type": "exit",
        "agent_id": "agent:7gen:optimized:a1b2c3d4",
        "content": { ... },
        "signatures": [
          {
            "zone_id": "zone-blue-corp-a",
            "oracle_id": "oracle-a-1",
            "signature": "sig:oracle-a:abc...",
            "timestamp": "2025-11-25T18:00:00Z"
          },
          {
            "zone_id": "zone-blue-corp-b",
            "oracle_id": "oracle-b-1",
            "signature": "sig:oracle-b:def...",
            "timestamp": "2025-11-25T18:00:01Z"
          }
        ]
      }

6.3.  Attestation Verification

   To verify a cross-zone attestation:

   1. Parse attestation structure
   2. For each signature:
      a. Identify signing zone
      b. Retrieve zone's Oracle public key
      c. Verify signature against content
      d. Check timestamp is within acceptable range
   3. Calculate attestation weight:
      -  Base weight from attestation type
      -  Multiplied by signing zone trust factors
      -  Bonus for multi-zone signatures
   4. Add to agent's Proof of Resilience

   Weight calculation:

      weight = base_weight * avg(trust_factors) * co_sign_bonus

   Where co_sign_bonus:

   -  1 signature: 1.0
   -  2 signatures: 1.2
   -  3+ signatures: 1.5

6.4.  Attestation Chain

   Attestations form a chain that tracks an agent's cross-zone journey:

      Zone A Entry --> Zone A Exit --> Zone B Entry --> Zone B Exit
           |               |               |               |
           v               v               v               v
      [Passage Att]   [Exit Att]     [Passage Att]   [Exit Att]
           |               |               |               |
           +-------+-------+-------+-------+-------+-------+
                                   |
                                   v
                          [Agent's Attestation Chain]

   The attestation chain provides:

   -  Complete history of zone participation
   -  Verifiable behavior record
   -  Input for Proof of Resilience
   -  Evidence for dispute resolution

7.  Trust Propagation

7.1.  Forward Propagation

   Positive events in one zone can increase trust in federated zones:

   Propagation trigger:

   -  Agent earns high-value attestation
   -  Agent achieves lineage advancement
   -  Agent demonstrates exceptional behavior

   Propagation formula:

      delta_trust_federated = delta_trust_local * propagation_factor
                              * trust_factor

   Where propagation_factor is typically 0.5 (positive events propagate
   at half strength).

   Example:

      Agent earns +5 resilience in Zone A
      Zone A to Zone B trust factor = 0.8
      Propagation factor = 0.5
      Trust increase in Zone B = 5 * 0.5 * 0.8 = 2

7.2.  Backward Propagation

   Negative events in one zone can decrease trust in previously visited
   zones:

   Propagation trigger:

   -  Agent commits policy violation
   -  Agent causes security incident
   -  Agent receives Soul veto

   Propagation formula:

      delta_trust_federated = delta_trust_local * propagation_factor
                              * trust_factor * recency_factor

   Where:

   -  propagation_factor for negatives is typically 0.8 (negative events
      propagate more strongly than positive)
   -  recency_factor decays based on time since zone visit

   Example:

      Agent loses -10 trust in Zone B due to incident
      Zone A to Zone B trust factor = 0.8
      Propagation factor = 0.8
      Recency factor = 0.9 (visited Zone A recently)
      Trust decrease in Zone A = 10 * 0.8 * 0.8 * 0.9 = 5.76

   Backward propagation ensures that bad actors cannot escape
   consequences by zone hopping.

7.3.  Propagation Limits

   To prevent trust cascades and gaming:

   1. Hop Limit: Trust propagates maximum 2 hops from source
   2. Decay per Hop: Each hop reduces propagation by 50%
   3. Daily Cap: Maximum trust change from propagation: +/-10/day
   4. Source Verification: Propagation requires verified attestation

   These limits ensure that:

   -  Local events have local primacy
   -  Federation provides benefit without dominance
   -  Gaming through federation is difficult

8.  Federation Events

8.1.  Zone Join

   When a new zone joins a federation:

   1. Zone completes registration requirements
   2. Zone applies for federation membership
   3. Existing members vote (if required by federation rules)
   4. Federation agreement is executed
   5. Trust Oracles are configured
   6. Zone is announced to federation
   7. Agents can begin crossing to/from new zone

   Join event broadcast:

      {
        "event_type": "zone_join",
        "federation_id": "fed-mesh-research",
        "new_zone": {
          "zone_id": "zone-blue-university-d",
          "zone_type": "blue",
          "operator": "University D"
        },
        "trust_factors": {
          "zone-blue-university-a": 0.85,
          "zone-blue-university-b": 0.85,
          "zone-blue-university-c": 0.80
        },
        "effective": "2025-12-01T00:00:00Z",
        "announced_by": "federation-coordinator"
      }

8.2.  Zone Leave

   When a zone leaves a federation:

   1. Zone announces intent to leave
   2. Notice period begins (per agreement)
   3. Agents are notified of impending change
   4. Cross-zone operations wind down
   5. Final attestations are issued
   6. Federation agreement terminates
   7. Zone is removed from federation

   Leave event broadcast:

      {
        "event_type": "zone_leave",
        "federation_id": "fed-mesh-research",
        "leaving_zone": {
          "zone_id": "zone-blue-university-d"
        },
        "reason": "voluntary_withdrawal",
        "notice_given": "2025-09-01T00:00:00Z",
        "effective": "2025-12-01T00:00:00Z",
        "agent_guidance": "Agents should complete cross-zone
                          operations before effective date"
      }

8.3.  Trust Factor Change

   When trust factors are adjusted:

   1. Triggering event occurs (incident, renegotiation, etc.)
   2. New trust factor is calculated
   3. Change is announced to affected zones
   4. Grace period for agent adjustment (optional)
   5. New factor takes effect
   6. Agents' cross-zone E_base is recalculated

   Change event broadcast:

      {
        "event_type": "trust_factor_change",
        "federation_id": "fed-bilateral-ab",
        "zone_a": "zone-blue-corp-a",
        "zone_b": "zone-blue-corp-b",
        "old_factor": 0.85,
        "new_factor": 0.70,
        "reason": "security_incident_response",
        "effective": "2025-11-26T00:00:00Z",
        "review_date": "2026-02-26T00:00:00Z"
      }

8.4.  Emergency Severance

   In case of security emergency, federation can be severed immediately:

   Triggers:

   -  Active breach in federated zone
   -  Compromise of federated zone's Oracle
   -  Malicious behavior by federated zone
   -  Regulatory requirement

   Severance process:

   1. Emergency severance declared
   2. All cross-zone traffic immediately blocked
   3. In-flight operations terminated
   4. Agents in severed zone are isolated
   5. Federation is suspended (not terminated)
   6. Investigation begins
   7. Resolution determines if federation resumes

   Severance event (immediate broadcast):

      {
        "event_type": "emergency_severance",
        "federation_id": "fed-bilateral-ab",
        "severing_zone": "zone-blue-corp-a",
        "severed_zone": "zone-blue-corp-b",
        "reason": "active_security_breach",
        "effective": "IMMEDIATE",
        "agent_action": "All agents in severed zone should
                        immediately cease operations",
        "contact": "security@corp-a.example.com"
      }

9.  Dispute Resolution

9.1.  Dispute Types

   Common federation disputes:

   1. Trust Factor Disputes: Disagreement over appropriate factor
   2. Attestation Disputes: Challenge to attestation validity
   3. Propagation Disputes: Disagreement over trust propagation
   4. Incident Attribution: Disagreement over incident responsibility
   5. Agreement Interpretation: Different readings of agreement terms
   6. Compliance Disputes: Alleged violation of federation obligations

9.2.  Resolution Process

   Standard resolution process:

   Phase 1: Direct Negotiation (30 days)

   -  Zones attempt to resolve directly
   -  Technical and legal teams engage
   -  Document positions and evidence

   Phase 2: Mediation (30 days, if needed)

   -  Neutral mediator engaged
   -  Non-binding facilitated discussion
   -  Attempt to find mutually acceptable resolution

   Phase 3: Arbitration (60 days, if needed)

   -  Binding arbitration per agreement
   -  Arbitrator reviews evidence
   -  Decision is final and enforceable

   Dispute record:

      {
        "dispute_id": "dispute-uuid-12345",
        "parties": ["zone-blue-corp-a", "zone-blue-corp-b"],
        "type": "attestation_validity",
        "filed": "2025-11-01T00:00:00Z",
        "status": "mediation",
        "summary": "Zone A challenges validity of Exit Attestation
                    issued by Zone B for Agent X",
        "evidence": ["att-uuid-67890", "flight-record-xyz"],
        "phase_history": [
          { "phase": "negotiation", "start": "2025-11-01",
            "end": "2025-11-30", "outcome": "unresolved" },
          { "phase": "mediation", "start": "2025-12-01",
            "mediator": "KTP Mediation Services" }
        ]
      }

9.3.  Arbitration

   Arbitration is the final dispute resolution mechanism:

   Arbitrator selection:

   -  Agreed upon in federation agreement
   -  Must have KTP expertise
   -  No conflicts of interest

   Arbitration process:

   1. Arbitrator reviews agreement and dispute
   2. Both parties submit evidence
   3. Technical experts may be consulted
   4. Arbitrator issues binding decision
   5. Decision is published (redacted if necessary)
   6. Parties must comply

   Arbitration outcomes:

   -  Trust factor adjustment
   -  Attestation invalidation
   -  Compliance requirements
   -  Financial remedies
   -  Federation termination

10.  Federation Governance

10.1.  Governance Bodies

   Large federations may establish governance bodies:

   Federation Council:

   -  Representatives from member zones
   -  Sets federation-wide policy
   -  Approves new members
   -  Resolves disputes

   Technical Committee:

   -  Technical experts from member zones
   -  Develops technical standards
   -  Reviews security issues
   -  Recommends protocol changes

   Audit Committee:

   -  Independent auditors
   -  Reviews member compliance
   -  Investigates incidents
   -  Reports to Council

10.2.  Policy Coordination

   Federated zones may coordinate policies:

   Mandatory coordination:

   -  KTP protocol version
   -  Trust Proof format
   -  Attestation format
   -  Security incident response

   Optional coordination:

   -  Action risk classifications
   -  Trust tier thresholds
   -  Sensor configurations
   -  Retention policies

10.3.  Standards Evolution

   KTP will evolve. Federations must manage evolution:

   Version compatibility:

   -  Zones must support current and previous major version
   -  18-month deprecation period for old versions
   -  Federation agreement specifies version requirements

   Change process:

   1. Proposal published to federation
   2. Technical review period (90 days)
   3. Pilot implementation in volunteer zones
   4. Federation-wide vote
   5. Implementation timeline established
   6. Coordinated rollout

11.  Security Considerations

11.1.  Federation Trust Attacks

   Attackers may attempt to manipulate federation trust.

   Mitigations:

   -  Trust factors change slowly (rate limited)
   -  Changes require multi-party approval
   -  Anomaly detection on trust factor changes
   -  Regular audit of federation relationships

11.2.  Attestation Fraud

   Zones might issue fraudulent attestations.

   Mitigations:

   -  Co-signature requirements
   -  Attestation verification
   -  Audit of attestation patterns
   -  Federation penalties for fraud

11.3.  Trust Laundering

   Agents might zone-hop to launder bad reputation.

   Mitigations:

   -  Backward propagation of negative events
   -  Trajectory chain verification
   -  Cross-zone reputation aggregation
   -  Hop limits on trust propagation

12.  References

12.1.  Normative References

   [KTP-CORE]
              Perkins, C., "Kinetic Trust Protocol - Core
              Specification", NMCITRA, November 2025.

   [KTP-ZONES]
              Perkins, C., "Kinetic Trust Protocol - Blue Zone
              Specification", NMCITRA, November 2025.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

Authors' Addresses

   Chris Perkins
   New Mexico Cyber Intelligence & Threat Response Alliance (NMCITRA)

   Email: cperkins@nmcitra.org