The Bureaucracy of Speed: Structural Equivalence Between Memory Consistency Models and Multi-Agent Authorization Revocation
Abstract
The temporal assumptions underpinning conventional Identity and Access Management collapse under agentic execution regimes. A sixty-second revocation window permits on the order of unauthorized API calls at 100 ops/tick; at AWS Lambda scale, the figure approaches . This is a coherence problem, not merely a latency problem. We define a Capability Coherence System (CCS) and construct a state-mapping preserving transition structure under bounded-staleness semantics. A safety theorem bounds unauthorized operations for the execution-count Release Consistency-directed Coherence (RCC) strategy at , independent of agent velocity -- a qualitative departure from the scaling of time-bounded strategies. Tick-based discrete event simulation across three business-contextualised scenarios (four strategies, ten deterministic seeds each) confirms: RCC achieves a reduction versus TTL-based lease in the high-velocity scenario (50 vs. 6,000 unauthorized operations), and under anomaly-triggered revocation. Zero bound violations across all 120 runs confirm the per-capability safety guarantee. Simulation code: https://github.com/hipvlady/prizm
Source: arXiv:2603.09875v1 - http://arxiv.org/abs/2603.09875v1 PDF: https://arxiv.org/pdf/2603.09875v1 Original Link: http://arxiv.org/abs/2603.09875v1