Evidence Graph Referring (C-4)

About this pattern

This is a generated FPF pattern page projected from the published FPF source. It is canonical FPF content for this ID; it is not a fpf-memory product feature page.

How to use this pattern

Read the ID, status, type, and normativity first. Use the content for exact wording, the relations for adjacent concepts, and citations to keep active work grounded without pasting the whole specification.

“A claim without a chain is only an opinion.”

FPF is a holonic framework: wholes are built from parts (A.1, A.14), and reasoning travels across scales via Γ‑flavours (B.1). To keep this reasoning honest and reproducible, every published assertion must be anchored in concrete symbol carriers and well‑typed transformations performed by an external TransformerRole (A.12, A.15). Publication itself is the typed projection I→D→S (Publ_ID, Formalize_DS) per A.7 and is not execution; any physical/digital release, rendering, or upload is Work by an external transformer on carriers, cited in SCR.

Keywords

  • evidence
  • traceability
  • provenance
  • evidence carrier
  • claim support
  • authority-reliance evidence path
  • generated-explanation source support
  • exact governing source
  • probe/distributed/export/causal evidence
  • SCR/RSCR.

Relations

A.10explicit referenceControlled Semantic Coarsening
A.10explicit referenceU.Work: The Record of Occurrence
A.10explicit referenceDependency Graph & Proofs
A.10explicit referenceCanonical Evolution Loop
A.10explicit referenceQuantum-Like Modeling Lens

Content

Context

FPF is a holonic framework: wholes are built from parts (A.1, A.14), and reasoning travels across scales via Γ‑flavours (B.1). To keep this reasoning honest and reproducible, every published assertion must be anchored in concrete symbol carriers and well‑typed transformations performed by an external TransformerRole (A.12, A.15). Publication itself is the typed projection I→D→S (Publ_ID, Formalize_DS) per A.7 and is not execution; any physical/digital release, rendering, or upload is Work by an external transformer on carriers, cited in SCR.

Practitioner shorthand:

Claim → (Proof or Test) → Confidence badge …where the proof/test is traceable to real carriers and to an external system/Transformer who executed an agreed method.

This pattern defines the Evidence Graph Referring Standard common to all Γ‑flavours (Γ_sys — formerly Γ_core, Γ_epist, Γ_method, Γ_time, Γ_work) and clarifies: (a) the difference between mereology (part‑whole; builds holarchies) and provenance (why a claim is admissible; does not build holarchies); (b) the run‑time / design‑time separation (A.4) across Role–Method–Work (A.15).

Use this when a model, report, metric, confidence badge, review note, or QL reading is starting to act like evidence but the carrier, transformer, method, time stance, or provenance edge is still implicit. The action is to turn the assertion into a small because-graph: name the claim, name the carriers, name the external transformer role, name the method or work trace, state the time/coverage condition, and attach the resulting evidence edge to the claim rather than to the holon itself.

Useful output: a claim that can answer "because of which carriers, by which transformer, using which method, and when?" without making provenance pretend to be part-whole structure.

Problem

Without a uniform anchor, models drift into five failure modes:

  1. Weightless claims. Metrics or arguments appear in the model with no link to their symbol carriers (files, datasets, lab notebooks, figures).
  2. Collapsed scopes. Design‑time method specs are silently mixed with run‑time traces; results cannot be reproduced because “what was planned” and “what actually ran” are conflated.
  3. Self‑justifying loops. A holon attempts to evidence itself (violates A.12 externality), producing cyclic provenance and unverifiable conclusions.
  4. Source loss during aggregation. As Γ combines parts, some sources “fall out”; later audit cannot reconstruct why a compound claim was accepted.
  5. Temporal ambiguity. Time‑series are aggregated without interval coverage or dating source; gaps/overlaps invalidate comparisons and trend claims.

The business effect is predictable: confidence badges cannot be defended, cross‑scale consistency (A.9) is broken, and iteration slows because every review re‑litigates “where did this come from?”.

Forces

ForceTension
Universality vs. authoring costOne Standard must fit systems and epistemes ↔ Authors should not drown in paperwork.
Externality vs. reflexivityEvidence must be produced by an external TransformerRole (A.12) ↔ Some systems adapt themselves (need reflexive modelling without self‑evidence).
Atemporal vs. temporalMany claims are state‑like ↔ Many others are histories; evidence must respect order and coverage (Γ_time).
Rigor vs. flowFormal proofs and controlled tests raise confidence ↔ Engineering cadence needs lightweight, incremental anchors.
Mereology vs. provenancePart‑whole edges build holarchies ↔ Evidence edges never do; the two graphs must interlock without leaking semantics.

Solution — The Evidence Graph Referring Standard

The Standard is a small set of primitives applied uniformly, with practitioner-first clarity and formal hooks for proof obligations. Its governed object is the evidence/provenance path for a claim: carriers, external transformer roles, method/work traces, time stance, and evidence edges. Authority-looking reliance and causal-use support are specialized uses of that same evidence path; they do not redefine A.10 as a pattern about labels, dashboard wording, or source rhetoric.

EPV‑DAG (Evidence–Provenance DAG).

A typed, acyclic graph disjoint from mereology. Node types: SymbolCarrier (a s.System in CarrierRole, A.15), TransformerRole (external Transformer, A.12), MethodDescription (design‑time blueprint of a method, A.15), Observation (a dated assertion/result), s.Episteme (knowledge holon). Edge vocabulary is small and normative: evidences, derivedFrom, measuredBy, interpretedBy, usedCarrier, happenedBefore (temporal), etc. Practitioner view: it is the “because‑graph”: every claim answers “because of these carriers, by this Transformer, using that method, then.”

Anchors (two relations, two flavours).**

  • verifiedBy — links a claim to formal evidence (proof obligations, static guarantees, model‑checking artefacts).
  • validatedBy — links a claim to empirical evidence (tests, measurements, trials, observations). Both anchors terminate in the EPV‑DAG, not in the mereology graph.

A.10:4.3 SCR / RSCR (Symbol Carrier Registers).

Every Γ_epist aggregation SHALL emit an SCR: an exhaustive register of symbol carriers materially used in the aggregate, with id, type, version/date, checksum, source/conditions and optional PortionOf (A.14) for sub‑carriers. Every Γ_epist^compile SHALL emit an RSCR: SCR specialised to a bounded context (vocabularies, units) with publication‑grade identifiers and hashes. Why this matters: it prevents “lost sources” during composition and underwrites reproducibility without mandating any specific tool.

A.10:4.4 Scope alignment (A.4) across Role–Method–Work (A.15).

  • Design‑time: MethodDescription lives here; methods are blueprints; anchors reference what would constitute proof or test.
  • Run‑time: Work (actual execution) lives here; traces reference which MethodDescription they instantiate and record happenedBefore. Bridging edges are explicit (“this run trace instantiates that spec”), so scopes never silently mix.

A.10:4.5 External TransformerRole (A.12).

The system that produces or interprets evidence is external to the holon under evaluation. If true reflexivity is essential, model a meta‑holon (A.12): the self‑updating holon becomes the object of a meta-holon external transformer (the “mirror”), restoring objectivity.

A.10:4.6 Γ‑flavour hooks (how each flavour anchors).

  • Γ_sys (formerly Γ_core): physical properties are anchored by measurement models, boundary conditions, calibration carriers, and dated observations.
  • Γ_epist: always outputs SCR/RSCR; every provenance/evidence node resolves to an SCR/RSCR entry.
  • Γ_method: order‑sensitive composition; at design‑time a Method Instantiation Card (MIC) states Precedes/Choice/Join and guards; at run‑time traces record happenedBefore and point to the MethodDescription they instantiate.
  • Γ_time: temporal claims state interval coverage; Monotone Coverage (no unexplained gaps/overlaps) is required.
  • Γ_work: resource spending and yield are evidenced by instrumented carriers (meters, logs) and their MethodDescriptions; keep resource rosters separate from SCR/RSCR.

Practitioner shortcut: If you can answer what carriers, which system, which method, when, the anchor is likely sufficient; if any of the four is missing, it is not.

Authority-reliance use of ordinary A.10 evidence paths

Use this subsection when an authority-looking case is being used as evidence for reliance. The evidence path is claim-bound: it supports a named claim or intended stronger use, not "authority" in general. This subsection does not change the governed object of A.10; it applies the same evidence/provenance path to high-pressure cases where displays, credentials, copied/generated text, dashboards, provenance labels, or attestations are being overread. If the live work, gate, speech-act, commitment, or evidence source is already clear, recover and cite that source directly instead of analyzing nearby wording first.

A10-lite is enough for source-finding, orientation, learning, and bounded reversible probes:

FieldRequired content
claim/useThe claim or intended stronger use the carrier is being asked to support.
carrierThe display, badge, credential, attestation, dashboard tile, copied text, generated text, log, trace, source file, report, or other external carrier.
producer/source roleThe role or system that issued, performed, attested, measured, copied, generated, verified, or displayed the material.
method/work eventThe work act, measurement, verification, review, build, attestation, copy, extraction, generation, dashboard query, API read, trace, log, or method instance that produced the carrier.
time/windowIssue time, validity window, decay, supersession, revocation, policy/gate version, and reopen condition.

Minimum path for routine reliance:

FieldRequired content
Supported claim or attempted stronger useApproval, permission, gate passage, role/status currentness, work occurrence, evidence support, assurance input, or other exact use being attempted.
CarrierThe visible or recovered carrier, with enough identity to reopen it.
Issuer, performer, source role, or trust anchorThe role/system accountable for producing or verifying the material in this context.
Affected object and relying contextThe release, service, model, person/role holder, policy subject, work item, claim, audience, tenant, environment, or other object for which reliance is attempted.
Time/window and freshnessIssue time, validity window, decay, supersession, revocation, policy/gate version, and reopen condition.
Evidence-producing work/event or method/work traceThe production, verification, query, generation, execution, or review work that made the carrier.
Evidence relation and rival explanationWhich claim the carrier supports, how it supports it, and the strongest live rival explanation such as stale display, spoofed badge, copied wording, generated paraphrase, context shift, carrier-only provenance, or local-only transform support.

Expanded fields are collected only insofar as they decide the live reliance question. Evidence depth scales with consequence severity, reuse, contestability, cross-context movement, and claim strength. Do not expand a source-finding note into a full evidence dossier, and do not collect every expanded field merely because a carrier is copied, generated, credential-like, provenance-like, or cross-context.

Adversarial misuse guard. Do not let carrier authenticity, provenance, copied approval, generated summary, stale screenshot, credential status view, or dashboard export convert into claim truth/currentness. Treat each as a rival explanation to test against issuer/source role, method/work trace, time/window, and relying context.

Data-minimization and privacy posture. Preserve minimum sufficient support for the intended reliance use. Use redacted, hashed, scoped, or role-mediated carrier refs when raw evidence would expose personal identity, access tokens, cryptographic proof material, tenant identifiers, security logs, incident details, internal release metadata, audit trails, privileged reviewer names, or sensitive model/data provenance. Redaction does not create source support; it must preserve enough recoverability for the relying context.

Expanded fieldWhen it is live
Method/work traceProvenance, attestation, generated/copied source support, dashboard/rollback support, or work occurrence is being used.
Carrier integrityThe carrier may be spoofed, stale, copied, transformed, rendered, redacted, or context-shifted.
Identity or holder bindingThe claim depends on a credential holder, role holder, issuer, performer, delegate, revoker, verifier, or relying party.
Verifier/relying-party context and acceptance ruleThe support is valid only for a verifier, audience, tenant, environment, release line, policy subject, operational mode, or consumer-side policy/gate rule that accepts the evidence for this use.
Proof / cryptographic-signature / status verification resultCredential, provenance, attestation, authenticity, revocation, or currentness support is claimed.
Policy/gate version and decision sourcePermission, admissibility, gate passage, release, rollback authority, or policy authorization is attempted.
Source-chain transform notesSupport passed through extraction, copy, rewrite, representation shift, explanation rendering, summary, export, redaction, or another transform step before reliance.
Source order and supersession ruleMultiple source candidates disagree or freshness/priority may defeat the visible item.
Minimum disclosure postureRaw evidence would expose secrets, personal data, tenant identifiers, privileged logs, tokens, security-sensitive traces, or unnecessary identities.

Case repairs:

CaseEvidence repair
Stale credential badgeShow issuer or trust anchor, holder/subject binding, verifier/relying-party context, proof/status result, revocation/freshness, validity window, and carrier integrity. Display presence is not current role/status or permission.
Verifiable credential / credential viewTreat as an A.10 carrier with issuer or trust anchor, holder/subject binding, verifier, proof/status/currentness, relying context, validity/revocation window, and acceptance rule. When those checks pass, it may support credential-currentness for that holder and relying context; it supports permission, authorization, role/status, or gate passage only when another exact source such as A.2.8, A.2.9, A.2.1, A.6.B, or A.21 says so.

| Copied approval or review summary | Show the original A.2.9 SpeechActRef / issuing act when approval or authorization is claimed, or the original reviewed source when only review-content currentness is claimed. Add copy relation, currentness, scope/window, evidence-producing work/event, and whether separate commitment/work support is live. Copy evidence is not approval by itself. | | Provenance/authenticity/attestation label | Show the bounded origin/history/build/process claim, source material, method/work trace, source-specific proof, carrier integrity, verifier/relying policy that accepts it for this use, and rival explanation. Provenance does not show truth, safety, approval, release, gate passage, permission, or assurance unless another exact source carries that stronger claim. | | Dashboard status tile | For gate-passage or release reliance, show dashboard query/source/time/window/currentness, source order, freshness policy, rival explanation, and the current A.21 GateDecision / DecisionLogRef with gate profile/version and release/work target; the A.10 path evidences that source chain. A status display is not gate passage or work occurrence by itself. |

| Rollback command-like cue | Show command/authorization source, actor, affected object, scope/window, and whether the cue is only an action invitation. A command cue is not execution evidence. | | Rollback execution result | Show A.15.1 U.Work occurrence, method/work trace, logs/traces, outcome evidence, and time/window. Execution evidence is not approval, assurance, or gate passage by itself. | | Generated explanation | Use E.17.EFP to classify the explanation relation and source-finding posture. For reliance, show claim-level attribution alignment: every operative claim relied on maps to a source passage, carrier, or exact governing source that supports that claim in the relying context. When that mapping is complete, A.10 may support those operative claims as source-backed evidence; the explanation itself still does not issue, approve, authorize, pass a gate, evidence execution, or raise assurance. |

| Model card or datasheet used as evidence | Show documented intended use, version/window, evaluation condition, limitations, evidence carriers, and whether a B.3 assurance claim is live. Documentation does not become readiness or assurance by presence. | | Extracted-source chain to gate/release use | Name the source locus, the first lossy or non-commutative transform step, the FPF relation or pattern governing that transform (A.6.3.CR, A.6.3.RT, A.6.3.CSC, E.17.EFP, E.17.ID.CR, or E.18 where applicable), the allowed inference move after the step, the exact governing source exit, the source reopen trigger, and the stronger use blocked until those supports are recoverable. | | Conflicting sources | When display, source carrier, decision log, recency/freshness signal, copied summary, generated summary, credential status, provenance label, or assurance evidence disagree, name the visible source, rival source, source order, decision source, freshness policy, and supersession rule. Do not choose by color, visual salience, confidence wording, copied wording, or apparent recency; stronger reliance is contested until the source-order question is resolved. |

| Sensitive evidence path | Use redacted, hashed, scoped, or role-mediated carrier refs when raw carriers expose secrets, personal data, security-sensitive material, privileged logs, tenant identifiers, or unnecessary identities. Redaction does not create source support; it must preserve enough recoverability for the relying context. | | Pointer/proof-status evidence path | Use a hash, proof/status verification result, source ref, scoped pointer, disclosure receipt, or role-mediated view instead of copying raw sensitive material when that artifact preserves enough recoverability for the relied-on claim/use. Do not copy raw secrets, tokens, privileged logs, personal identities, or tenant details merely to make the evidence path look fuller. |

If the path is incomplete, A.10 returns evidence/source posture, not action or reliance support for the attempted stronger use. Valid dispositions include source-finding only, reopen original carrier, request issuer/status verification, refresh dashboard/API query, mark stale/contested, downgrade intended use, proceed only with reversible/local action, or block the unsupported stronger reliance.

Broken-source repair route. If the relying actor cannot recover or verify the source path, return the repair to the accountable source role: issuer/performer, verifier/status service, evidence-producing work role/system, gate-decision source, role/status source, or boundary source. The A.10 result should name the missing source and blocked use rather than making the relying actor reconstruct a source they cannot issue or verify.

Role prompts for evidence/currentness use:

Role in the situationPrompt
Relying actorWhich exact claim/use needs support, and what is the minimum carrier/source/time/relation path for that use?
Issuer/verifier/status sourceWhich issuer, holder, verifier, proof/status, currentness, revocation, or acceptance-rule source must be exposed or repaired?
Auditor/reviewerWhich carrier, source role, method/work trace, time/window, evidence relation, and rival explanation must be recoverable?
Security/compliance sourceWhich source order, supersession, proof/status, revocation, and minimum-disclosure posture decide this reliance question?
LLM/tool userWhich generated or copied operative claims map to source passages or carriers, and which claims remain only source-finding?
Model/data sourceWhich intended-use, evaluation-condition, version/window, limitation, and evidence carriers bound the model/data documentation?

Repeated missing-source signal. If the same visible-item family repeatedly returns stale, contested, no-source, or no-currentness A.10 results, record a source-system repair item: instrument the source, expose decision/source refs, add currentness/status checks, preserve claim-level source links for generated or copied outputs, require credential views to show status/currentness windows, require model/data documentation to expose intended-use and evaluation-condition fields, or require provenance/attestation labels to name their bounded claim type. Repetition is a sign that the source path or display needs repair; it is not a reason to make each acting user rebuild the path manually.

Display guidance for evidence/currentness: an evidence or status display should show the claim/use, carrier/source role, exact ref or link, time/window/freshness, relying context, and unsupported stronger uses. A display that can only show source availability should say so; it must not imply approval, permission, gate passage, work occurrence, or assurance.

Incident-learning fields for evidence/currentness overread: visible carrier, intended claim/use, missing source-path field, exact carrier/source role/method-work/time relation needed, rival explanation that made the overread plausible, current safe disposition, and upstream repair item for instrumentation, source refs, status/currentness, claim-level source links, credential view, model/data documentation, or provenance/attestation label.

Contestability/redress route: when an evidence/currentness path affects person or team status, access, responsibility, compliance posture, or release decision, the A.10 result should name the disputed claim, carrier/source role, verifier or status source, freshness/revocation source, privacy-minimized evidence ref, safe interim disposition, and review route. A disputed display remains contested until the source-order or currentness question is resolved.

Positive repaired path. When the source path is complete, return the smallest source-backed support statement: named claim/use, carrier and source role, method/work trace, time/window/currentness, evidence relation, and the exact use it supports. This lets the relying pattern proceed inside that scope without treating evidence support as approval, permission, gate passage, work occurrence, or assurance.

What this does not authorize: A.10 does not approve, authorize action, pass a gate, release, create permission, create a commitment, assign a role, record a work occurrence, or raise assurance. It supplies the evidence path and support posture that A.15, A.6, B.3, A.21 gate-decision sources, A.20 constraint-validity sources, A.2.9 speech-act sources, A.2.8 commitment sources, A.15.1 work-occurrence sources, or another exact governing source may consume.

Causal evidence support basis in evidence paths

Evidence graph paths that support causal-use claims must carry the C.28-governed CausalEvidenceSupportBasis without redefining causal estimands or causal support authority.

The C.28 values that A.10 may carry in an evidence path are:

observationalAssociationSupportBasis
interventionalActionSupportBasis
realizedCounterfactualSampleSupportBasis
identifiedCounterfactualEstimateSupportBasis
simulationOnlyCounterfactualOutputBasis

A.10 consumes this value set from C.28; it does not add causalAssumptionOnlySupport or noCausalEvidenceSupport as evidence-basis values. Assumption-only and no-support postures are represented by causal assumptions, support verdict, supported use, unsupported use, or abstain in C.28/B.3, not by a second evidence-basis vocabulary.

No unsupported causality-ladder climb:

observational-association evidence -> interventional-action claim requires CausalIdentificationProfile.
interventional-action evidence -> counterfactual-comparison claim requires CausalIdentificationProfile for
  identifiedCounterfactualEstimateSupportBasis, CounterfactualSamplingRealizabilityProfile for
  realizedCounterfactualSampleSupportBasis, or bounded-use treatment.
Simulation-only counterfactual output may support bounded model-supported use when model assumptions, validation, supported use, and unsupported use are declared. It does not become interventional evidence or realized counterfactual sample evidence by vocabulary, validation, or evidence-role relabeling alone.

Evidence-path micro-examples:

CausalEvidenceSupportBasisEPV-style path cue
observationalAssociationSupportBasisobserved cohort table -> PathSlice to measurement work -> association-use support statement; unsupported use = intervention-effect wording.
interventionalActionSupportBasisrandomized or governed action assignment record -> work trace -> declared intervention-effect support inside assignment, follow-up, and outcome window.
realizedCounterfactualSampleSupportBasiscounterfactual-rung sampling work plan -> run trace -> evidence carrier -> samples from declared target counterfactual distribution under physical/ethical/operational constraints.
identifiedCounterfactualEstimateSupportBasiscausal assumptions, graph/calculus proof, available-data regime set, and bound refs -> CausalIdentificationProfile -> estimated or bounded counterfactual use with supported/unsupported use.
simulationOnlyCounterfactualOutputBasissimulator output -> counterfactual model assumptions -> simulation validation ref -> bounded model-supported use; validation remains validation and does not convert the path into direct sample evidence or intervention-effect evidence.

What changes in practice: an evidence path can show that a carrier supports a causal-use claim, but it must also show the causal evidence support basis and the relevant C.28 support references when the claim climbs from observation to intervention or from intervention to counterfactual comparison.

What this does not authorize: A.10 does not identify causal effects, create an estimand, certify target-trial emulation, or decide counterfactual sampling realizability; it stores and makes recoverable the evidence graph path and causal support-basis refs needed by C.28 and B.3.

Archetypal Grounding

Aspects.System — Autonomous Brakes.Episteme — Meta-analysis
Claim“Stop within 50 m from 100 km/h.”“Drug A outperforms control on endpoint E.”
AnchorverifiedBy: static‑analysis proof of no overflow; validatedBy: instrumented track tests.verifiedBy: power‑analysis proof of sample size; validatedBy: pooled effect sizes with bias checks.
Carriers (SCR/RSCR)Scale logs, calibration certificates, test track telemetry; SCR lists all; RSCR adds context units.PDFs of studies, data tables, analysis code; SCR lists carriers; RSCR adapts vocabularies/units for the target audience.
External TransformerRoleIndependent test team / metrology lab.Independent synthesis team / statistician.
TemporalDated runs; happenedBefore between setup → test → teardown.Publication dates; dataset versions; monotone coverage of included studies.

Conformance Checklist

IDRequirementPurpose (what it prevents)
CC‑A10.1 (EPV‑DAG Presence)Every published claim MUST have a path in the Evidence–Provenance DAG (EPV‑DAG) to concrete SymbolCarrier nodes and to the external TransformerRole that produced or interpreted the evidence.Stops “weightless claims” and self‑justifying text.
CC‑A10.2 (SCR)Any Γ_epist^synth operation SHALL output an SCR listing all symbol carriers materially used in the aggregate s.Episteme.Prevents source loss during aggregation.
CC‑A10.3 (RSCR)Any Γ_epist^compile operation SHALL output an RSCR adapted to the target bounded context (vocabularies, units) with publication‑grade identifiers/hashes; SCR→RSCR MUST preserve carrier identity/integrity.Keeps releases auditable and context‑consistent.
CC‑A10.4 (Resolution)Every provenance/evidence node in the dependency graph MUST be resolvable to an SCR/RSCR entry. Unresolved links invalidate the claim.Eliminates dangling references and unverifiable citations.
CC‑A10.5 (Scope Separation)A single EPV‑DAG instance SHALL NOT mix design‑time MethodDescription nodes with run‑time Work traces. Bridges (“this run trace instantiates that spec”) MUST be explicit.Avoids conflating intent and execution.
CC‑A10.6 (Externality)The evidencing TransformerRole MUST be external to the holon under evaluation (A.12). Reflexive cases require modelling a meta‑holon and an external mirror.Prevents self‑creation/self‑evidence paradoxes.
CC‑A10.7 (Temporal Coverage)For Γ\_time claims, interval coverage MUST be monotone and fully specified; gaps/overlaps require explicit justification or rejection.Stops invalid time‑series aggregation.
CC‑A10.8 (Integrity & Immutability)SCR/RSCR entries MUST include version/date and checksums; published SCR/RSCR are immutable—updates create a new revision id with a pointer to the prior one.Guards against silent drift and tampering.
CC‑A10.9 (Holarchy Firewall)EPV‑DAG MUST use provenance edges only; mereological edges (ComponentOf, MemberOf, PortionOf, PhaseOf, etc.) MUST NOT appear in EPV‑DAG; conversely, provenance edges MUST NOT be used to build holarchies.Keeps part‑whole and evidence semantics disjoint.
CC‑A10.10 (Γ_sys Anchors)Physical claims aggregated by Γ_sys MUST reference measurement models (quantity, unit, uncertainty), boundary conditions, and calibration carriers.Ensures physical plausibility and comparability.
CC‑A10.11 (Γ_method Anchors)For order‑sensitive composition, design‑time MUST include a Method Instantiation Card (MIC) (Precedes/Choice/Join, guards, exceptions); run‑time traces MUST record happenedBefore and reference the MethodDescription they instantiate.Preserves order semantics and reproducibility.
CC‑A10.12 (Γ_work Anchors)Resource spending/yield claims MUST be evidenced by instrumented carriers (meters, logs) and their MethodDescriptions; resource rosters MUST NOT be conflated with SCR/RSCR.Distinguishes cost accounting from knowledge carriers.
CC-A10.13 (Causal support-basis path)If an evidence path supports a causal-use claim, it MUST carry CausalEvidenceSupportBasis from C.28 and any relevant CausalIdentificationProfile, CounterfactualSamplingRealizabilityProfile, or CausalUseEvidenceDesignRecord refs; A.10 MUST NOT identify causal effects or mint a second support-basis value set.Keeps evidence graph support recoverable without moving causal authority out of C.28.
CC-A10.14 (Authority-reliance use of ordinary evidence paths)When a carrier is used to support approval, permission, gate passage, role/status currentness, work occurrence, provenance, authenticity, copied/generated source support, assurance input, or another authority-reliance use, the evidence path SHALL name the supported claim or attempted stronger use, carrier, issuer/performer/source role or trust anchor, affected object and relying context, time/window, freshness/revocation stance, evidence-producing work/event or method/work trace, evidence relation, and strongest rival explanation. Expanded fields SHALL be named only when they decide the live reliance question: method/work trace, carrier integrity, identity or holder binding, verifier/relying-party context and acceptance rule, proof / cryptographic-signature / status verification result, policy/gate version and decision source, source-chain transform notes, source order/supersession rule, and minimum disclosure posture.Prevents evidence-support laundering from badges, dashboards, copied text, generated explanations, credentials, provenance labels, and composed chains without turning source-finding into a full dossier.

Practitioner’s audit (non‑normative, quick): For any claim, ask What carriers? Which system? Which method? When? If any answer is missing, A.10 is not satisfied.

Consequences

BenefitWhy it mattersTrade‑off / Mitigation
Cross‑scale reproducibilityAny composite metric or argument can be walked back to its carriers and method.Overhead of maintaining SCR/RSCR. Mitigation: keep entries minimal but complete; use checklists from the pedagogical companion.
Design/run clarityIntent (MethodDescription) is cleanly separated from execution (Work traces).Discipline needed at boundaries. Mitigation: MIC templates; explicit “instantiates” bridges.
Objective evidenceExternal TransformerRole eliminates self‑evidence loops.Reflexive systems require a mirror meta‑holon. Mitigation: provide a “reflexive modelling” appendix with examples.
Comparable numbers over timeTemporal coverage invariants prevent “trend” claims built on gaps.Extra dating work for legacy data. Mitigation: allow provisional labels until dating is completed.
Safe composition of knowledgeSCR/RSCR keep sources intact as Γ_epist composes epistemes.Initial friction in teams new to carrier thinking. Mitigation: start with “top‑10 carriers per claim” rule, expand as needed.
Feeds B.3 typed assurance claimsAnchors provide evidence inputs such as R and CL only for a named typed assurance claim.B.3 is not a generic trust or assurance score; cite the exact claim and relying context.

Rationale (SoTA alignment, reader‑friendly)

  • Metrology & assurance. The requirement to name quantities, units, uncertainty, calibration carriers reflects long‑standing metrology practice and modern assurance cases: numbers are only comparable when their measurement models are stated.
  • Knowledge provenance. The EPV‑DAG and SCR/RSCR embody post‑2015 best practices in provenance for knowledge artefacts: keep a complete, machine‑checkable trail from claims to carriers; separate provenance from part‑whole.
  • Temporal reasoning. Monotone coverage (no unexplained gaps/overlaps) aligns with temporal knowledge graph practice and avoids “impossible histories.”
  • Holonic parsimony. By drawing a firewall between mereology (A.14) and provenance, A.10 prevents semantic leakage and keeps the holarchy well‑typed.
  • Role–Method–Work clarity. Anchoring explicitly rides on A.15: roles act via methods specified at design‑time and produce work observed at run‑time. This keeps agency, policy, and execution disentangled yet connected.
  • Credential, provenance, attestation, and generated-source currentness. Verifiable credentials / digital identity practice separates issuer or trust anchor, holder binding, proof/status result, revocation, validity window, audience, and relying context. C2PA content provenance and SLSA / in-toto attestations separate bounded origin/history/build/process claims from truth, approval, release, safety, gate passage, permission, or assurance; their consumer-side verifier or policy acceptance rule is part of the relying context, not implied by artifact presence. LLM citation and generated-explanation practice requires claim-level attribution alignment before operative claims are relied on. A.10 adopts issuer/holder/verifier/status/currentness and claim-level attribution as evidence-path invariants, adapts credential, provenance, attestation, model/data documentation, and generated-explanation practice as FPF source-role and carrier-support inputs, and rejects visual display, copied text, generated text, provenance mark, credential display, or attestation form as evidence of a stronger action, gate, role/status, work-occurrence, assurance, or admissible-action effect without exact source support.

Relations

  • Builds on: A.1 Holonic Foundation; A.4 Temporal Duality; A.12 Transformer Externalization; A.14 Advanced Mereology; A.15 Role–Method–Work Alignment.
  • Constrains / used by: B.1 (all Γ‑flavours: Γ_sys, Γ_epist, Γ_method, Γ\_time, Γ_work); B.1.1 (Dependency Graph & Proofs).
  • Enables: B.3 Trust Calculus (R/CL inputs, auditability); B.4 Canonical Evolution Loop (clean design/run bridges).
  • Coordinates with: C.28 when an evidence path is used as causal-use support; A.10 carries the evidence/provenance path, while C.28 governs causal-use question, support basis, identification, realizability, and supported/unsupported use.
  • Coordinates with: A.15 for first-use action/reliance disposition, A.6 for mixed boundary wording, B.3 for assurance strength, A.21 for OperationalGate(profile), GateDecision, and DecisionLogRef, A.20 for ConstraintValidity status/witness, A.2.9 for speech-act refs, A.2.8 for commitments, and A.15.1 for work occurrences. A.10 supplies evidence paths for those sources; it does not create their gate decision, commitment, role/status, work-occurrence, assurance, or admissible-action effect.

Migration (practical and brief)

Apply these text edits:

  1. Terminology

    • manifest“Symbol Carrier Register (SCR)”; release manifest“Release SCR (RSCR)”.
    • creator / observer (as internal evidencer) → TransformerRole (external).
    • “symbol register” (ambiguous) → “Symbol Carrier Register (SCR)”.
    • Keep resource rosters in Γ_work separate from SCR/RSCR.
  2. Boilerplate inserts

    • In A.10 (this pattern): retain definitions of EPV‑DAG, SCR/RSCR, and the flavour‑specific anchors.
    • In B.1.3 (Γ_epist): add the Obligations — SCR/RSCR block (“Γ_epist^synth SHALL output SCR… Γ_epist^compile SHALL output RSCR…”).
    • In B.1.5 (Γ_method): ensure MIC is referenced (Precedes/Choice/Join, guards, exceptions) and run‑time traces reference the MethodDescription they instantiate.
    • In B.1.6 (Γ_work): say “resource rosters are not SCR/RSCR; anchor meter/log readings via EPV‑DAG.”

Evidence carriers for quantum-like readings

Use A.10 when a quantum-like statement needs evidence rather than only a local modeling note. The practical question is not "is this quantum-like source impressive?" but "which carrier supports which weak claim, under which time window and method?"

Action path:

  1. State the weakest state/probe/export/viability reading being supported.
  2. Pin the concrete carriers: source, trace, dashboard export, report, observation, metric, work result, model output, interview, survey, or incident record.
  3. State the evidence-producing role and method: who or what produced the carrier, by which method, probe, measurement, or work act.
  4. State the time window and decay/reopen condition.
  5. State what the carrier does not show, including the strongest rival explanation still live.
  6. Choose the next pattern: stay in A.10 for carrier anchoring, route to B.3 for assurance strength, route to C.16 for measurement legality, route to F.9 for bridge/export loss, or route to a C.26.* pattern for the remaining probe/state/envelope question.

For probe-coupled, distributed-state, bridge-loss, measurement-frame, or viability-envelope readings, include at least:

FieldRequired content
ClaimThe weakest state/probe/export/viability reading being supported
CarrierThe concrete evidence carrier or carrier class
Source roleSource, witness, measurement, report, trace, dashboard, work product, or human statement
Method / probeThe measurement, work act, survey, dashboard query, API read, workshop, model, or trace query that produced the carrier
Time windowWhen the evidence was produced and how long it remains fit for the intended inference
Confidence / limitsWhat the carrier does not show, and what rival explanation remains plausible
Reopen triggerWhen stronger decision, assurance, audit, or action use requires more evidence

Useful outputs:

  • a local evidence note when the claim only guides discussion;
  • an EPV-DAG / SCR / RSCR entry when the claim enters a published assertion;
  • a B.3 assurance tuple when the claim will support readiness, audit, release, compliance, or comparative strength;
  • a reroute note when the carrier shows only ordinary measurement, bridge loss, or work enactment.

Do not let the label quantum-like carry evidence weight by itself. The evidence graph carries the claim; the math lens only explains what representational mistake the evidence is being used to avoid.

A.10:End