Distributed Query Semantics, Sovereignty, and Expansion Scope in MAP¶
1. Foundational Invariants¶
MAP is an agent-centric, sovereignty-preserving, federated graph system. The following invariants govern distributed query behavior:
- Every Holon has exactly one Home Space.
- HolonIds are space-relative. There are no universal identifiers.
- Holons are immutable (ActionHash-based).
- Queries always return SmartReferences (never full holon bodies).
- Resolution is always lazy and handled exclusively by HolonsCache.
- TrustChannels govern all cross-space data exfiltration.
These invariants eliminate global graph assumptions and require explicit domain semantics for distributed queries.
2. SmartReference Semantics¶
A SmartReference contains:
- A space-relative
HolonId - A best-effort, salience-ordered projection of properties
- A bound
TransactionContextHandle
Projection Rules¶
The projection subset is:
- TrustChannel-authorized
- Salience-ordered
- Size-bounded (e.g., 1KB LinkTag limit)
It is non-authoritative but correct (immutability guarantees no inconsistency).
Missing properties trigger lazy resolution via HolonsCache.
Consequences¶
- Filtering, sorting, and paging operate on SmartReferences.
- No eager fetch is required during query execution.
- Resolution always re-enforces TrustChannel permissions.
3. Execution Domain (Rootless Queries)¶
Rootless queries such as:
MATCH (v:ValueMeme)
require an explicit ExecutionDomain.
There is no global scan primitive.
ExecutionDomain defines:¶
- The set of spaces
Sxin which the root pattern is evaluated. - Typically includes:
- Local space
- Selected We-spaces
- Spaces reachable via authorized TrustChannels
ExecutionDomain applies only to seed selection.
After the initial match, traversal is governed by ownership.
4. Expansion Scope Rule¶
Core Rule¶
Expansion is always executed in the Home Space of the source holon.
If:
Vlis owned by space L → expand in LVxis owned by space X → expand in X
Only the owning space has authoritative adjacency for a holon.
5. Cross-Space Expansion and Sovereignty¶
If expansion from Vx (in X) yields u (owned by Y):
- X determines adjacency.
- X filters results according to its TrustChannel agreement with the caller.
- X may return
uonly if authorized to exfiltrate it. - Returned SmartReferences remain relative to X.
Important¶
- Y granting X access to
udoes not imply X may shareuwith L. - TrustChannel agreements are bilateral and non-transitive.
- No space may launder another space’s data beyond its promise.
6. Canonical Space Identity and Cross-Space Rebinding¶
External HolonIds are proxy-relative and therefore not portable across spaces:
HolonId::External {
space_id: Proxy_S_to_T,
local_id: LocalId_T
}
Proxy_S_to_T is defined only within space S.
It has no meaning in any other space.
Therefore:
- X’s
ExternalIdfor a Y-owned holon cannot be directly resolved by L. - Proxy identifiers are strictly local wiring constructs.
- There are no universal identifiers in MAP.
6.1 Canonical Space Identity¶
To support federated reference exchange without leaking proxy internals, MAP introduces the concept of a Canonical Space Identity.
A Canonical Space Identity:
- Is a stable identifier for a space within a defined trust domain.
- Is negotiated or declared as part of TrustChannel agreements.
- Is shared among participants who intend to exchange references to that space.
- Is not required to be globally unique.
- May differ across federations or trust domains.
Important:
A space may have multiple Canonical Space Identities, provided that any collaborating participants share the same canonical identifier for that space within their agreement scope.
The minimal requirement for rebinding is:
- If X shares a reference to a Y-owned holon with L,
- Then both X and L must recognize the same Canonical Space Identity for Y within their shared trust context.
6.2 Rebinding Rule¶
When X expands and encounters a holon u owned by Y, and is authorized to share it with L, X should return a reference expressed as:
(canonical_space_id_Y, LocalId_Y)
Not:
HolonId::External { proxy_X_to_Y, LocalId_Y }
Upon receiving the canonical reference, L performs rebinding:
- L checks whether it has a TrustChannel with canonical_space_id_Y.
-
If yes:
- L maps the canonical identity to its own proxy
Proxy_L_to_Y. - L constructs:
HolonId::External { space_id: Proxy_L_to_Y, local_id: LocalId_Y }
- L maps the canonical identity to its own proxy
-
If no:
- The reference is non-resolvable in L.
- This is correct and sovereignty-preserving.
This preserves:
- Proxy isolation
- Bilateral trust semantics
- Non-universal identity
- Federated interoperability
6.3 Sovereignty and Re-Export Constraints¶
Canonical identity does not imply transitive trust.
Even if:
- Y grants X access to
u, and - X grants L access to some data,
It does not imply:
- Y has granted L access to
u, nor - X may re-export Y’s holons without permission.
Therefore:
- X may only return a canonical reference to
uif permitted under its TrustChannel agreement with L. - Re-export permission is a policy decision governed by TrustChannel terms.
- Trust is bilateral and non-transitive by default.
6.4 Correct Cross-Space Expansion Model¶
Cross-space expansion must respect:
- Ownership authority (expansion executes in the home space).
- TrustChannel exfiltration permissions.
- Canonical identity agreement within the trust domain.
- Proxy-relative rebinding in the receiving space.
- Non-transitive trust constraints.
There is no implicit chain-of-trust identity propagation. There is no universal identifier layer. There is only negotiated canonical identity within explicit trust scopes.
7. Transitive Closure Semantics¶
For recursive patterns such as:
MATCH (v)-[:RELATES_TO*]->(u)
Traversal proceeds as follows:
- Seed set determined by ExecutionDomain.
- Each expansion step executes in the Home Space of the current node.
- Results are filtered by the TrustChannel between the expanding space and the caller.
- Expansion migrates across spaces only when relationships cross space boundaries.
- No implicit broadcast across all domains occurs.
Traversal forms a choreography of delegated expansions along trust channels.
8. No Global Graph Illusion¶
MAP does not model a single global graph.
It models:
- A network of sovereign graphs (one per space)
- Connected via TrustChannels
- With identity scoped per space
- And mediated expansion across boundaries
Therefore:
- There is no universal MATCH.
- There is no universal node identity.
- There is no transitive trust by default.
All distributed query behavior must respect:
- Ownership
- Mediation
- Bilateral promises
- Space-relative identity
9. Clean Responsibility Separation¶
| Concern | Responsibility |
|---|---|
| Seed selection | Query layer (ExecutionDomain) |
| Expansion locus | Home Space of source node |
| Data sharing | TrustChannel policy |
| Resolution | HolonsCache (lazy only) |
| Identity scoping | Space-relative HolonId |
This separation preserves sovereignty while enabling federated navigation.
10. Summary¶
Distributed OpenCypher support in MAP must adhere to:
- Explicit ExecutionDomain for rootless queries
- Ownership-based expansion
- TrustChannel-filtered exfiltration
- Space-relative identity
- Lazy SmartReference resolution
- No implicit global graph semantics
Federated query in MAP is not global traversal.
It is mediated, delegated expansion across sovereign spaces.