Skip to content

Conversation

@andorsk
Copy link
Contributor

@andorsk andorsk commented Nov 3, 2025

This document outlines the governance process for use cases within the Trusted AI Agents Working Group, detailing definitions, roles, lifecycle stages, transition triggers, tagging rules, evaluation criteria, and review processes.

This document outlines the governance process for use cases within the Trusted AI Agents Working Group, detailing definitions, roles, lifecycle stages, transition triggers, tagging rules, evaluation criteria, and review processes.
Added additional flowchart steps for governance process.
| **Domain** | `identity`, `authorization`, `governance`, `policy`, `registry`, `attestation`, `trust`, `privacy`, `security`, `delegation` | Describes the primary technical or conceptual domain. |
| **Lifecycle / Activity** | `drafting`, `under-review`, `accepted`, `active`, `retired` | Mirrors the use case’s current lifecycle status for quick search or dashboards. |
| **Priority** | `p0`, `p1`, `p2`, `backlog` | Used during prioritization cycles to indicate importance or readiness. |
| **Cross-WG Links** | `toip`, `owf`, `nanda`, `w3c`, `ietf`, `dif-labs` | Indicates related standards bodies or overlapping scopes. |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm unclear on what these mean/do-- does tagging a use-case with one of these mean the WG:

  1. needs sign-off from some subset/WG of these groups to proceed to a given stage?
  2. should (i.e. sets itself a reminder to) cross-post or email at a given stage to invite review/input from that org or some WG within it?
  3. is hoping to be a work item over there some day?
  4. none of the above ?

Particularly as this github tags are public, it's probably good to maket his super explicit lest viewers (from those orgs) jump to conclusions when they see that tag!

- Initial Risk Triage & Screening
The WG team assesses for duplicates and high-risk flags, including trust-specific risks (e.g., Does the goal involve handling personally identifiable information [PII] or protected health information [PHI]? Does it lack "verifiable identity mechanisms" or risk untraceable actions, such as insecure token propagation across security boundaries?). Ideas with high-risk flags or unclear technical/trust value are rejected or returned for clarification.
- Prioritization Scoring
- Preference are for Simple As Possible
Copy link
Contributor

@bumblefudge bumblefudge Nov 3, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this line item is very confusing-- does the whole WG apply all 5 of these heuristics for each use-case, before handing final decision to the WG chairs, in addition to the prior scoring and flagging/heuristics? is this a separate step, or just a summary of what happens in the rubric outlined in the next section?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Create a Grading Rubric for Accepting Use Cases. Weigh in on your categories / design requirements!

3 participants