Node Directory
Complete registry of every node in this garden patch.
47 grafted nodes · 14 citation compounds · 35 form definitions grafted
Grafted Nodes
Principles
Core axioms grounding authority and delegation architecture.
Models
Structural representations of authority and delegation mechanisms.
Patterns
Recurring problem-solution structures observed across systems.
Convictions
Core value commitments grounding the architecture.
Citations
Primary sources with compound analysis and insights.
Glosses
Interpretive definitions that frame authority and delegation concepts.
- [[Accountability as a Layer Not a Replacement]] — Add coordination between sovereign systems without modifying either side
- [[Deep Context as Shared Language]] — When practitioners share deep context, a single phrase invokes an entire framework of understanding
- [[Deep Context Graph Vocabulary]] — Plain markdown as a typed graph — nodes, edges, and predicates defined
- [[Garden Patch as Composable Knowledge Fragment]] — A portable garden fork that reveals connections in external content through typed knowledge forms
- [[Ghost Link as Unplanted Garden Stake]] — A reference to a node that does not exist yet — a stake marking where one could grow
- [[Grafted Node as Transplanted Knowledge in a Garden Patch]] — A node copied from the source garden into a garden patch, where it grows in new context
- [[Patch-Native Node as Original Knowledge in a Garden Patch]] — A node born in a garden patch — this patch is its garden home
- [[Principal Authority as Agency Law for Digital Identity]] — Agency law applied to digital identity — five duties, five definitions, revocability as litmus test
- [[Structural Contract as Form Type Agreement]] — The agreement that every instance of a form type follows the same internal structure
- [[Upstream Node as Source Garden Reference]] — A node that exists in the source garden but was not grafted into this patch
- [[Principle of Least Privilege]] — The 1975 original — minimum permissions for the job, considered in isolation
- [[Principle of Least Authority]] — Miller’s expansion — privileges form a web of transitive authority, not isolated grants
- [[Principle of Least Access]] — Allen’s extension into data — minimum exposure necessary, with correlation as the threat model
- [[Necessary Privilege]] — Allen’s inversion — what does the user actually need? Everything else excluded by default
- [[Necessary Authority]] — Allen’s inversion of Miller — withholding necessary authority creates friction without improving safety
- [[Necessary Access]] — Allen’s inversion of least access — declare data needs upfront for bilateral consent, not unilateral extraction
- [[Inside-Out Methodology as Design Pattern Innovation]] — Flip a restrictive pattern inside out and you find the enabling pattern it was hiding
- [[Dignity Not Asset Protection as Security Design Frame]] — Security design protects people with dignity, not assets with classifications
Boundaries
Scope limits that define where concepts apply and where they do not.
Decisions
Recorded choices with reasoning.
Inquiries
Open questions under active investigation.
Scenarios
Future-facing narratives exploring where the architecture leads.
Domains
Thematic clusters that organize nodes by subject area.
- [[Agentic Architecture]] — How to architect the scaffold that lets agents augment human work without replacing human judgment
- [[Deep Context Architecture]] — Metacognitive architecture for captured reasoning — typed nodes, predicates, and progressive disclosure in service of human insight
- [[Self-Sovereign Identity]] — Identity owned by the individual — the first non-Deep Context Architecture domain in the garden