Recognition: unknown
Atomic Decision Boundaries: A Structural Requirement for Guaranteeing Execution-Time Admissibility in Autonomous Systems
Pith reviewed 2026-05-10 05:32 UTC · model grok-4.3
The pith
Admissibility requires atomic decision boundaries because split evaluation systems cannot prevent state mismatches from environmental interleaving.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
We introduce the atomic decision boundary as a structural property in which decision evaluation and the resulting state transition are jointly determined as a single indivisible step in the labeled transition system model. We distinguish atomic systems from split evaluation systems and prove via constructive counterexample trace that under realistic concurrent environments no construction can make a split system equivalent to an atomic system with respect to admissibility. Three corollaries follow: impossibility of execution-time guarantees in split systems, insufficiency of external state enrichment, and admissibility as an execution-time rather than evaluation-time property. We further (1)
What carries the argument
The atomic decision boundary, the structural coupling of decision evaluation and state transition as one indivisible LTS step that prevents interleaving mismatches.
If this is right
- Execution-time guarantees are impossible in any split evaluation system.
- External state enrichment cannot close the architectural gap created by interleaving.
- Admissibility must be treated as an execution-time property rather than an evaluation-time property.
- The Escalate outcome transfers the atomicity requirement rather than eliminating it.
- Common mechanisms such as RBAC, ABAC, OPA, Cedar, and AWS IAM are structurally split and therefore cannot provide execution-time admissibility.
Where Pith is reading between the lines
- Designers of autonomous systems that modify shared state should therefore require atomic architectures for any admission control layer.
- The same structural gap may appear in other concurrency contexts such as transactional memory or real-time schedulers where decision and effect are separated.
- A practical test would be to instrument a split policy engine and search for mismatch traces under controlled interleaving; absence of such traces would contradict the paper's result.
Load-bearing premise
Environmental actions can always interleave between the evaluation transition and the state transition in split systems, creating a state mismatch that policies cannot close from within the split architecture.
What would settle it
An explicit construction of a split evaluation system that produces the same set of admissible transitions as its atomic counterpart even when arbitrary environmental actions are allowed to interleave between evaluation and transition would falsify the central impossibility claim.
Figures
read the original abstract
Autonomous systems increasingly execute actions that directly modify shared state, creating an urgent need for precise control over which transitions are permitted to occur. Existing governance mechanisms evaluate policies prior to execution or reconstruct behavior post hoc, but do not enforce admissibility at the exact moment a state transition is committed. We introduce the atomic decision boundary, a structural property of admission control systems in which the decision and the resulting state transition are jointly determined as a single indivisible step in the labeled transition system (LTS) model of execution. We distinguish two classes: atomic systems, where evaluation and transition are coupled within a single LTS step, and split evaluation systems, where they are separate transitions interleaved by environmental actions. The separation introduces an architectural gap -- the decision is evaluated in one system state; the transition fires in a potentially different one -- that no policy, regardless of sophistication, can close from within a split architecture. Under realistic concurrent environments, we prove via a constructive counterexample trace that no construction can make a split system equivalent to an atomic system with respect to admissibility. Three corollaries follow: impossibility of execution-time guarantees in split systems, insufficiency of external state enrichment, and admissibility as an execution-time rather than evaluation-time property. We further formalize the Escalate outcome -- absent from classical TOCTOU analyses -- proving that it transfers rather than eliminates the atomicity requirement: resolution is safe if and only if it is itself atomic. We classify RBAC, ABAC, OPA, Cedar, and AWS IAM as split systems and ACP as atomic, providing a structural taxonomy of existing governance mechanisms. Admissibility is a property of execution, not evaluation.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper introduces the 'atomic decision boundary' as a structural property in labeled transition system (LTS) models of autonomous systems, where policy evaluation and state transition must occur as a single indivisible step to guarantee execution-time admissibility. It distinguishes atomic systems (coupled evaluation and transition) from split evaluation systems (separate transitions subject to environmental interleaving), proves via a constructive counterexample trace that no policy in a split architecture can prevent state mismatches under concurrency, and derives corollaries on the impossibility of execution-time guarantees, the insufficiency of external state enrichment, and admissibility as an execution-time property. The work also analyzes the Escalate outcome, classifies mechanisms such as RBAC, ABAC, OPA, Cedar, and AWS IAM as split systems and ACP as atomic, and concludes that admissibility is a property of execution rather than evaluation.
Significance. If the LTS definitions and counterexample are rigorous, the result provides a clear structural taxonomy explaining limitations of existing governance mechanisms in concurrent environments and underscores why admissibility cannot be reduced to evaluation-time checks. The constructive proof and corollaries offer a falsifiable framework for assessing system architectures, with potential value for formal methods in autonomous systems design.
minor comments (2)
- [§3] §3 (or equivalent section defining the LTS): clarify the precise transition labels and state components used in the atomic vs. split models to ensure the counterexample trace is reproducible from the definitions alone.
- [Classification section] The classification of existing systems (RBAC, ABAC, etc.) as split or atomic would benefit from explicit mapping to the LTS transition rules for each, rather than summary statements.
Simulated Author's Rebuttal
We thank the referee for the accurate summary of our contributions and the recommendation for minor revision. The report correctly captures the distinction between atomic and split evaluation systems, the constructive counterexample proving no policy can close the architectural gap under concurrency, and the corollaries on execution-time properties.
Circularity Check
No significant circularity; derivation follows directly from LTS definitions
full rationale
The paper's central claim is an impossibility result: in any LTS where evaluation and commit are modeled as distinct transitions (split systems), environmental interleaving produces a state mismatch that no policy evaluated only at the first transition can prevent, while atomic systems couple them in one step. This is established via a constructive counterexample trace that follows immediately once the LTS semantics and interleaving permission are granted by definition. No parameters are fitted, no result is renamed as a prediction, and no load-bearing premise reduces to a self-citation or self-definition. The taxonomy of RBAC/ABAC/OPA/Cedar/AWS IAM as split versus ACP as atomic is a direct classification from the atomic/split distinction rather than a derived prediction. The corollaries on Escalate and admissibility as an execution-time property are logical consequences of the same model separation. The argument is therefore self-contained against external benchmarks and does not exhibit any of the enumerated circularity patterns.
Axiom & Free-Parameter Ledger
axioms (1)
- standard math Labeled transition system (LTS) model of execution
invented entities (3)
-
atomic decision boundary
no independent evidence
-
atomic systems
no independent evidence
-
split evaluation systems
no independent evidence
Forward citations
Cited by 2 Pith papers
-
Reconstructive Authority Model: Runtime Execution Validity Under Partial Observability
RAM separates integrity from coverage and uses a reconstruction gate over proven state, assumptions, and unobservable residuals to block invalid executions, achieving zero invalid rates in synthetic tests where attest...
-
Agent Control Protocol: Admission Control for Agent Actions
ACP is a temporal admission control protocol that combines static risk scoring with anomaly accumulation and cooldowns to limit harmful agent behavior over time, reducing approvals from 100% to 0.4% in tested workloads.
Reference graph
Works this paper leans on
-
[1]
Anderson
James P. Anderson. Computer security technology planning study. Technical Report ESD- TR-73-51, USAF Electronic Systems Division, 1972
1972
-
[2]
A critical analysis of vulnerability taxonomies
Matt Bishop and David Bailey. A critical analysis of vulnerability taxonomies. Technical Report CSE-96-11, University of California at Davis, 1996
1996
-
[3]
Cedar: A new policy language
John Cutler et al. Cedar: A new policy language. InUSENIX Security Symposium, 2023
2023
-
[4]
Agent Control Protocol: Admission Control for Agent Actions
Marcelo Fernandez. Agent control protocol: Admission control for agent actions.https:// arxiv.org/abs/2603.18829, 2026. arXiv:2603.18829 [cs.CR], DOI:10.5281/zenodo.19672575
work page internal anchor Pith review Pith/arXiv arXiv doi:10.5281/zenodo.19672575 2026
-
[6]
Zenodo. DOI: 10.5281/zenodo.19672597
-
[7]
Marcelo Fernandez. Irreducible multi-scale governance: Composition and limits of atomic admission systems.https://doi.org/10.5281/zenodo.19672608, 2026. Zenodo. DOI: 10.5281/zenodo.19672608
-
[8]
Marcelo Fernandez. Reconstructive authority model: Runtime execution validity under partial observability.https://doi.org/10.5281/zenodo.19669430, 2026. Agent Governance Series, Paper 5. Zenodo. DOI: 10.5281/zenodo.19669430
-
[9]
From Admission to Invariants: Measuring Deviation in Delegated Agent Systems
Marcelo Fernandez. From admission to invariants: Measuring deviation in delegated agent systems.https://doi.org/10.5281/zenodo.19672589, 2026. Zenodo. DOI: 10.5281/zen- odo.19672589. arXiv:2604.17517
work page internal anchor Pith review Pith/arXiv arXiv doi:10.5281/zenodo.19672589 2026
-
[10]
Harrison, Walter L
Michael A. Harrison, Walter L. Ruzzo, and Jeffrey D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461–471, 1976
1976
-
[11]
Herlihy and Jeannette M
Maurice P. Herlihy and Jeannette M. Wing. Linearizability: A correctness condition for concurrent objects.ACM Transactions on Programming Languages and Systems, 12(3):463– 492, 1990
1990
-
[12]
Edit automata: Enforcement mechanisms for run-time security policies.International Journal of Information Security, 4(1–2):2–16, 2005
Jay Ligatti, Lujo Bauer, and David Walker. Edit automata: Enforcement mechanisms for run-time security policies.International Journal of Information Security, 4(1–2):2–16, 2005
2005
-
[13]
Open policy agent.https://www.openpolicyagent.org,
Open Policy Agent Contributors. Open policy agent.https://www.openpolicyagent.org,
-
[14]
Ramadge and W
Peter J. Ramadge and W. Murray Wonham. Supervisory control of a class of discrete event processes.SIAM Journal on Control and Optimization, 25(1):206–230, 1987
1987
-
[15]
Sandhu, Edward J
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models.IEEE Computer, 29(2):38–47, 1996
1996
-
[16]
Schneider
Fred B. Schneider. Enforceable security policies.ACM Transactions on Information and System Security, 3(1):30–50, 2000. 20
2000
-
[17]
Portably solving file TOCT- TOU races with hardness amplification
Dan Tsafrir, Tomer Hertz, David Wagner, and Dilma Da Silva. Portably solving file TOCT- TOU races with hardness amplification. InUSENIX Conference on File and Storage Tech- nologies (FAST), 2008. 21
2008
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.