<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="o-*+"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-marstein-satp-asset-exchange-00" category="info" consensus="true" submissionType="IETF" tocDepth="4" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="SATP Asset Exchange">Secure Asset Exchange Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-marstein-satp-asset-exchange-00"/>
    <author initials="K." surname="Marstein" fullname="Kjell-Erik Marstein">
      <organization>Cathmere</organization>
      <address>
        <email>kjell-erik@cathmere.com</email>
      </address>
    </author>
    <author initials="A." surname="Chiriac" fullname="Alex Chiriac">
      <organization>Quant Network</organization>
      <address>
        <email>alexandru.chiriac@quant.network</email>
      </address>
    </author>
    <author initials="L." surname="Riley" fullname="Luke Riley">
      <organization>Quant Network</organization>
      <address>
        <email>luke.riley@quant.network</email>
      </address>
    </author>
    <author initials="V." surname="Ramakrishna" fullname="Venkatraman Ramakrishna">
      <organization>IBM Research</organization>
      <address>
        <email>vramakr2@in.ibm.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="03"/>
    <area>Applications and Real-Time</area>
    <workgroup>Secure Asset Transfer Protocol</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 176?>

<t>This document describes the Secure Asset Exchange (SAE) Protocol. SAE is an extension of the Secure Asset Transfer (SAT) Protocol that enables the asset exchange interoperability mode.
It specifies the required modifications necessary to the SAT message flows to facilitate asset exchange between asset networks.
Gateways that support the SAT protocol can be extended to also support SAE, enabling support for both asset transfer and asset exchange in a single set of gateways.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-satp.github.io/draft-marstein-satp-asset-exchange/draft-marstein-satp-asset-exchange.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-marstein-satp-asset-exchange/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Asset Transfer Protocol Working Group mailing list (<eref target="mailto:sat@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/sat/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/sat/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-satp/draft-marstein-satp-asset-exchange"/>.</t>
    </note>
  </front>
  <middle>
    <?line 182?>

<section anchor="introduction">
      <name>Introduction</name>
      <t anchor="introduction-doc">This document presents the Secure Asset Exchange Protocol (SAEP), an extension of the Secure Asset Transfer (SAT) Protocol <xref target="SATP"/> that facilitates asset exchange between asset networks.
The asset exchange protocol is a mediated cross-authentication protocol for cross-network digital asset exchange.
SATP gateways can be extended to support the asset exchange mode, enabling support for both the asset transfer and asset exchange interoperability modes through a single set of gateways.
The reader is directed to <xref target="SATA"/> for further discussion of the interoperability modes recognized in SATP.</t>
      <t>The SAE protocol uses a lock-and-assign pattern to facilitate the asset exchange, where all assets included in the exchange are locked or otherwise disabled within their respective networks before being assigned to the designated beneficiaries.
This process is coordinated by peer gateways, where each gateway is connected to one of the digital asset networks involved in the exchange.
The lock-and-assign pattern is used to facilitate atomicity, consistency, isolation, and durability (ACID) in the cross-network exchange process.</t>
      <t>The goal of this draft is to define an asset exchange protocol that builds upon the architectural and procedural foundations established in earlier SATP drafts (<xref target="SATA"/>, <xref target="SATP"/>).
Asset exchange as a core interoperability requirement is recognized in the SATP architecture <xref target="SATA"/>, and is, thus, a natural progression of the protocol.
The reader is directed to <xref target="SATU"/> for further discussion of the use cases enabled by the asset exchange version of SATP.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t anchor="terminology-doc">The following are some terminology used in the current document. We borrow terminology from <xref target="NIST"/> and <xref target="ISO"/> where possible, introducing new terms only when needed:</t>
      <ul spacing="normal">
        <li>
          <t>Digital asset: A digital representation of a value or of a right that can be transferred and stored electronically using distributed ledger technology or similar technology <xref target="MICA"/>.</t>
        </li>
        <li>
          <t>Asset network (system): The network or system where a digital asset is utilized.</t>
        </li>
        <li>
          <t>Secure Asset Transfer Protocol (SATP): The protocol used to transfer (move) a digital asset from one network to another using gateways.</t>
        </li>
        <li>
          <t>Secure Asset Exchange Protocol (SAEP): The protocol used to exchange a digital asset in one network for a digital asset in another network using gateways.</t>
        </li>
        <li>
          <t>Asset transfer: A fail-safe process of moving an asset from one network to another, with the destruction of the asset in the origin network and its recreation in the destination network occurring as a single atomic action.</t>
        </li>
        <li>
          <t>Asset exchange: A fail-safe process of exchanging (or swapping) assets held by a pair of owners, each asset being maintained in a different network, with the two in-network transfers occurring as a single atomic action.</t>
        </li>
      </ul>
    </section>
    <section anchor="the-secure-asset-exchange-protocol">
      <name>The Secure Asset Exchange Protocol</name>
      <section anchor="saep-protocol">
        <name>Overview</name>
        <t anchor="saep-overview">The Secure Asset Exchange Protocol (SAEP) is a gateway-to-gateway protocol enabling cross-network digital asset exchange, first introduced in <xref target="SAEP"/>.
The protocol intends to have a low barrier of adoption in systems that already implement SATP by potentially being enabled through the same set of gateways.</t>
        <t>This document presents the modifications necessary to the SATP message flows and to the asset network actions to support the asset exchange mode.
The asset exchange protocol inherits the SATP model and behavior where not otherwise stated.
The reader is directed to <xref target="SATP"/> for further discussion of SATP and non-modified behavior.</t>
        <t>While several variations of the message flows can be used to support a gateway-to-gateway asset exchange protcol, a conscious design choice is to diverge as little as possible from the asset transfer version of SATP by reusing established definitions, semantics, and security guarantees where possible.
This allows the protocol to leverage the progress of SATP and simplifies integration with existing SATP compliant systems.</t>
        <t>The gateway referred to as the "sender gateway" in SATP takes on the role as "initiating" gateway of the asset exchange, and the gateway referred to as the "recipient gateway" takes on the role as "receiving" gateway, referring to each gateway's role in initiating the exchange.
The protocol defines API endpoints, resources and identifier definitions, and message flows used in orchestrating the asset exchange between the two gateways.</t>
      </section>
      <section anchor="stages-of-the-protocol">
        <name>Stages of the Protocol</name>
        <t anchor="saep-stages">The SAE protocol follows the same three message stages as SATP:</t>
        <ul spacing="normal">
          <li>
            <t>Transfer Initiation stage (Stage-1): The gateways come to an agreement of the set of parameters describing the proposed exchange. The gateway initiating the exchange delivers the initial proposal containing the set of parameters.</t>
          </li>
          <li>
            <t>Lock Assertion stage (Stage-2): The initiating gateway conveys a signed assertion to the receiving gateway, asserting the locked status of the asset in the network connected to the initiating gateway.</t>
          </li>
          <li>
            <t>Commitment Preparation and Finalization stage (Stage-3): The receiving gateway conveys a signed assertion to the initiating gateway, asserting the locked status in the network connected to the receiving gateway. The gateways finalize the exchange by assigning the assets to their beneficiaries, and convey signed assertions pertaining to the status of the assets in their respective networks to the counterparty gateway.</t>
          </li>
        </ul>
        <t>The interactions between the peer gateways prior to the initiation stage is referred to as the setup stage (Stage-0), which is outside the scope of the current specification of SATP.</t>
      </section>
      <section anchor="message-types">
        <name>Message Types</name>
        <t anchor="saep-message-types">This refers to the type of request or response to be conveyed in the message.
The values are defined in <xref target="SATP"/>.</t>
        <t>The possible values for an asset exchange session facilitated by SAEP are:</t>
        <ul spacing="normal">
          <li>
            <t>transfer-proposal-msg: The exchange proposal message sent by the gateway initiating the exchange. The message contains the set of parameters proposed for the exchange.</t>
          </li>
          <li>
            <t>proposal-receipt-msg: The signed receipt message indicating acceptance of the exchange proposal by the receiving gateway.</t>
          </li>
          <li>
            <t>reject-msg: The reject message sent from a gateway to another. The message contains an indication of the reason for the rejection.</t>
          </li>
          <li>
            <t>transfer-commence-msg: The exchange commence message sent by the gateway initiating the exchange, requesting to begin the commencement of the asset exchange.</t>
          </li>
          <li>
            <t>ack-commence-msg: Response to accept the commencement of the asset exchange.</t>
          </li>
          <li>
            <t>lock-assert-msg: The gateway has performed the locking of the asset in its network.</t>
          </li>
          <li>
            <t>assertion-receipt-msg: The receiving gateway acknowledges receiving the signed lock-assert-msg.</t>
          </li>
          <li>
            <t>commit-prepare-msg: The initiating gateway requests the start of the commitment stage.</t>
          </li>
          <li>
            <t>ack-prepare-msg: The receiving gateway acknowledges receiving the previous commit-prepare-msg and agrees to start the commitment stage.</t>
          </li>
          <li>
            <t>ack-commit-final-msg: The gateway has performed the asset assignment in its network.</t>
          </li>
          <li>
            <t>commit-transfer-complete-msg: The initiating gateway indicates closure of the current transfer session.</t>
          </li>
          <li>
            <t>error-msg: This message is used to indicate that an error has occured at the SATP layer. It can be transmitted by either gateway.</t>
          </li>
          <li>
            <t>session-abort-msg: This message is used by a gateway to abort the current session.</t>
          </li>
        </ul>
        <t>The reader is directed to <xref target="SATP"/> for further discussion of the message types.</t>
      </section>
    </section>
    <section anchor="modified-message-flows">
      <name>Modified Message Flows</name>
      <t anchor="saep-flows">The SAE protocol follows the same Stage-1 and Stage-2 message flows as <xref target="SATP"/>.</t>
      <t>Stage-1 flows pertain to the initialization of the transfer session between the two gateways.</t>
      <t>Stage-2 flows cover the conveyance of the signed assertion pertaining to the asset's locked status in network N1 connected to the initiating gateway G1.</t>
      <t>If the signed assertion conveyed by gateway G1 in Stage-2 is accepted by gateway G2, it must in return initiate Stage-3 and transmit a signed receipt to gateway G1 that it has correctly locked the asset in network NW2 connected to gateway G2.</t>
      <t>The remaining Stage-3 flows commit gateways G1 and G2 to assigning the locked assets to their respective benficiaries.
The initiating gateway G1 must assign (unlock) the asset in network NW1 to the correct benficiary in network NW1 and gateway G2 must assign (unlock) the asset in network NW2 to the correct beneficiary in network NW2.</t>
      <t><tt>
       App1  NW1          G1                     G2          NW2    App2
      ..|.....|............|......................|............|.....|..
        |     |            |       Stage 1        |            |     |
        |     |            |                      |            |     |
        |     |       (1.1)|--Transf. Proposal --&gt;|            |     |
        |     |            |                      |            |     |
        |     |            |&lt;--Proposal Receipt---|(1.2)       |     |
        |     |            |                      |            |     |
        |     |       (1.3)|---Transf. Commence--&gt;|            |     |
        |     |            |                      |            |     |
        |     |            |&lt;----ACK Commence-----|(1.4)       |     |
        |     |            |                      |            |     |
      ..|.....|............|......................|............|.....|..
        |     |            |       Stage 2        |            |     |
        |     |            |                      |            |     |
        |     |&lt;---Lock----|(2.1)                 |            |     |
        |     |            |                      |            |     |
        |     |       (2.2)|----Lock-Assertion---&gt;|            |     |
        |     |            |                      |            |     |
        |     |            |                 (2.3)|--Record---&gt;|     |
        |     |            |                      |            |     |
        |     |            |&lt;--Assertion Receipt--|(2.4)       |     |
        |     |            |                      |            |     |
      ..|.....|............|......................|............|.....|..
        |     |            |       Stage 3        |            |     |
        |     |            |                      |            |     |
        |     |       (3.1)|----Commit Prepare---&gt;|            |     |
        |     |            |                      |            |     |
        |     |            |                 (3.2)|----Lock---&gt;|     |
        |     |            |                      |            |     |
        |     |            |&lt;----Commit Ready-----|(3.3)       |     |
        |     |            |                      |            |     |
        |     |&lt;--Assign---|(3.4)                 |            |     |
        |     |            |                      |            |     |
        |     |       (3.5)|-----Commit Final----&gt;|            |     |
        |     |            |                      |            |     |
        |     |            |                 (3.6)|---Assign--&gt;|     |
        |     |            |                      |            |     |
        |     |            |&lt;-----ACK Final-------|(3.7)       |     |
        |     |            |                      |            |     |
        |     |            |                      |            |     |
        |     |&lt;--Record---|(3.8)                 |            |     |
        |     |            |                      |            |     |
        |     |       (3.9)|--Transfer Complete--&gt;|            |     |
      ..|.....|............|......................|............|.....|..
                                Figure 2
</tt></t>
      <section anchor="transfer-initiation-stage-stage-1">
        <name>Transfer Initiation Stage (Stage 1)</name>
        <t anchor="saep-stage1">This section describes the transfer initiation stage, where the initiating gateway and the receiving gateway prepare for the start of the asset exchange.</t>
        <t>The initiating gateway proposes the set of transfer parameters and asset-related artifacts for the exchange to the receiving gateway.
The parameters are contained in the Transfer Initiation Claim.</t>
        <t>The SAE protocol requires two Transfer Initiation Claims, one for each asset involved in the exchange.
The inclusion of two Transfer Initiation Claims in the proposal signals to the receiving gateway that the session should be conducted using SAEP as opposed to SATP.</t>
        <t>The reader is directed to <xref target="SATP"/> for further discussion of Stage-1.</t>
      </section>
      <section anchor="lock-assertion-stage-stage-2">
        <name>Lock Assertion Stage (Stage 2)</name>
        <t anchor="saep-stage2">The messages in this stage pertain to the initiating gateway providing the receiving gateway with a signed assertion that the asset in network NW1 has been locked or disabled, and under the control of the initiating gateway.</t>
        <t>The reader is directed to <xref target="SATP"/> for further discussion of Stage-2.</t>
      </section>
      <section anchor="commitment-preparation-and-finalization-stage-3">
        <name>Commitment Preparation and Finalization (Stage 3)</name>
        <t anchor="saep-stage3">This section describes the exchange commitment agreement between the client (initiating gateway) and the server (receiving gateway).</t>
        <t>This stage must be completed within the time specified in the lockAssertionExpiration value in the lock-assertion or commit ready message, whichever is shortest.</t>
        <t>The reader is directed to <xref target="SATP"/> for further discussion of required HTTP endpoints, methods, request parameter serialization, and digital signatures for this message.</t>
        <section anchor="commit-preparation-message-commit-prepare">
          <name>Commit Preparation Message (Commit-Prepare)</name>
          <t anchor="saep-commit-preparation-message">The purpose of this message is for the client to indicate its readiness to begin the commitment of the exchange.
In response to this message, the receiving gateway must lock or otherwise disable the asset in network NW2.</t>
          <t>The reader is directed to <xref target="SATP"/> for further discussion of the Commit Preparation Message.</t>
        </section>
        <section anchor="commit-ready-message-commit-ready">
          <name>Commit Ready Message (Commit-Ready)</name>
          <t anchor="saep-commit-ready">The purpose of this message is for the server to indicate to the client that the server has locked or otherwise disabled the asset in network NW2 and that the server is ready to proceed to the next step.
In response to this message, the initiating gateway can perform the assignment of the asset in network NW1 to its designated benficiary.</t>
          <t>This message is sent from the server to the Commit Ready Endpoint at the client.</t>
          <t>The message must be signed by the server.</t>
          <t>The SAE protocol requires the message transmitted in this step to be formatted as a lock-assert-msg instead of following the commit-ready-msg format specified for this step in SATP.</t>
          <t>The parameters of this message consist of the following:</t>
          <ul spacing="normal">
            <li>
              <t>messageType REQUIRED. It MUST be the value urn:ietf:satp:msgtype:lock-assert-msg.</t>
            </li>
            <li>
              <t>sessionId REQUIRED: A unique identifier chosen earlier by client in the Initialization Request Message.</t>
            </li>
            <li>
              <t>transferContextId REQUIRED: A unique identifier used to identify the current exchange session at the application layer.</t>
            </li>
            <li>
              <t>hashPrevMessage REQUIRED. The hash of the previous message.</t>
            </li>
            <li>
              <t>lockAssertionClaim REQUIRED. The lock assertion claim or statement by the server.</t>
            </li>
            <li>
              <t>lockAssertionClaimFormat REQUIRED. The format of the claim.</t>
            </li>
            <li>
              <t>lockAssertionExpiration REQUIRED. The duration of time of the lock or escrow upon the asset.</t>
            </li>
          </ul>
          <t>Example:</t>
          <t>{\
  "messageType": "urn:ietf:satp:msgtype:lock-assert-msg",\
  "sessionId": "d66a567c-11f2-4729-a0e9-17ce1faf47c1",\
  "transferContextId": "89e04e71-bba2-4363-933c-262f42ec07a0",\
  "hashPrevMessage": "8dcc8dc4e6c2c979474b42d24d3747ce4607a92637d1a7b294857ff7288b8e46",\
  "lockAssertionClaim": {},\
  "lockAssertionClaimFormat": "LOCK_ASSERTION_CLAIM_FORMAT_1",\
  "lockAssertionExpiration": "2024-12-23T23:59:59.999Z",\
}\</t>
        </section>
        <section anchor="commit-final-assertion-message-commit-final">
          <name>Commit Final Assertion Message (Commit-Final)</name>
          <t anchor="saep-commit-final-message">The purpose of this message is for the client to indicate to the server that the client (initiating gateway) has completed the assignment of the asset in network NW1.</t>
          <t>The message must contain a standalone claim related to the assignment of the asset by the client.
The standalone claim must be signed by the client.</t>
          <t>This message is sent from the client to the Commit Final Assertion Endpoint at the server.</t>
          <t>The message must be signed by the client.</t>
          <t>The SAE protocol requires the message transmitted in this step to be formatted as an ack-commit-final-msg instead of following the commit-final-msg format specified for this step in SATP.</t>
          <t>The parameters of this message consist of the following:</t>
          <ul spacing="normal">
            <li>
              <t>messageType REQUIRED. It MUST be the value urn:ietf:satp:msgtype:ack-commit-final-msg.</t>
            </li>
            <li>
              <t>sessionId REQUIRED: A unique identifier chosen earlier by the client in the Initialization Request Message.</t>
            </li>
            <li>
              <t>transferContextId REQUIRED: A unique identifier used to identify the current exchange session at the application layer.</t>
            </li>
            <li>
              <t>hashPrevMessage REQUIRED. The hash of the previous message.</t>
            </li>
            <li>
              <t>assignmentAssertionClaim REQUIRED. The claim or statement by the client that the asset has been assigned by the client to the intended beneficiary.</t>
            </li>
            <li>
              <t>assignmentAssertionClaimFormat REQUIRED. The format of the claim.</t>
            </li>
          </ul>
          <t>Example:</t>
          <t>{\
  "messageType": "urn:ietf:satp:msgtype:ack-commit-final-msg",\
  "sessionId": "d66a567c-11f2-4729-a0e9-17ce1faf47c1",\
  "transferContextId": "89e04e71-bba2-4363-933c-262f42ec07a0",\
  "hashPrevMessage": "b92f13007216c58f2b51a8621599c3aef6527b02c8284e90c6a54a181d898e02",\
  "assignmentAssertionClaim": {},\
  "assignmentAssertionClaimFormat": "ASSIGNMENT_ASSERTION_CLAIM_FORMAT_1",\
}\</t>
        </section>
        <section anchor="commit-final-acknowledgement-receipt-message-ack-final-receipt">
          <name>Commit-Final Acknowledgement Receipt Message (ACK-Final-Receipt)</name>
          <t anchor="saep-final-ack">The purpose of this message is to indicate to the client that the server has completed the assignment of the asset to the intended beneficiary in network NW2.</t>
          <t>The reader is directed to <xref target="SATP"/> for further discussion of the Commit-Final Acknowledgement Receipt Message.</t>
        </section>
        <section anchor="transfer-complete-message">
          <name>Transfer Complete Message</name>
          <t anchor="saep-transfer-complete-message">The purpose of this message is for the client to indicate to the server that the asset exchange session (identified by sessionId) has been completed and no further messages are to be expected from the client in regards to this transfer instance.</t>
          <t>The reader is directed to <xref target="SATP"/> for further discussion of the Transfer Complete Message.</t>
        </section>
      </section>
      <section anchor="error-messages">
        <name>Error Messages</name>
        <t>The reader is directed to <xref target="SATP"/> for further discussion of error messages.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t anchor="saep-security-considerations">The reader is directed to <xref target="SATP"/> for further discussion of security considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t anchor="saep-iana-considerations">This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="SAEP" target="https://doi.org/10.1109/ICBC64466.2025.11185062">
          <front>
            <title>Adapting the Secure Asset Transfer Protocol for Secure Cross-Network Asset Exchange, IEEE ICBC Cross-Chain Workshop (ICBC-CCW)</title>
            <author initials="K." surname="Marstein">
              <organization/>
            </author>
            <author initials="P." surname="Davita">
              <organization/>
            </author>
            <author initials="L." surname="Riley">
              <organization/>
            </author>
            <date year="2025" month="June"/>
          </front>
        </reference>
        <reference anchor="ISO" target="https://www.iso.org/standard/82208.html">
          <front>
            <title>Blockchain and distributed ledger technologies-Vocabulary (ISO:22739:2020)</title>
            <author initials="" surname="ISO">
              <organization/>
            </author>
            <date year="2020" month="July"/>
          </front>
        </reference>
        <reference anchor="NIST" target="https://doi.org/10.6028/NIST.IR.8202">
          <front>
            <title>NIST Blockchain Technology Overview (NISTR-8202)</title>
            <author initials="D." surname="Yaga">
              <organization/>
            </author>
            <author initials="P." surname="Mell">
              <organization/>
            </author>
            <author initials="N." surname="Roby">
              <organization/>
            </author>
            <author initials="K." surname="Scarfone">
              <organization/>
            </author>
            <date year="2018" month="October"/>
          </front>
        </reference>
        <reference anchor="MICA" target="https://www.esma.europa.eu/esmas-activities/digital-finance-and-innovation/markets-crypto-assets-regulation-mica">
          <front>
            <title>EU Directive on Markets in Crypto-Assets Regulation (MiCA)</title>
            <author initials="" surname="European Commission">
              <organization/>
            </author>
            <date year="2023" month="June"/>
          </front>
        </reference>
        <reference anchor="SATA" target="https://datatracker.ietf.org/doc/draft-ietf-satp-architecture/">
          <front>
            <title>Secure Asset Transfer (SAT) Interoperability Architecture, IETF, draft-ietf-satp-architecture-08</title>
            <author initials="T." surname="Hardjono">
              <organization/>
            </author>
            <author initials="M." surname="Hargreaves">
              <organization/>
            </author>
            <author initials="N." surname="Smith">
              <organization/>
            </author>
            <author initials="V." surname="Ramakrishna">
              <organization/>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="SATP" target="https://datatracker.ietf.org/doc/draft-ietf-satp-core/">
          <front>
            <title>Secure Asset Transfer Protocol (SATP) Core, IETF, draft-ietf-satp-core-11</title>
            <author initials="M." surname="Hargreaves">
              <organization/>
            </author>
            <author initials="T." surname="Hardjono">
              <organization/>
            </author>
            <author initials="R." surname="Belchior">
              <organization/>
            </author>
            <author initials="V." surname="Ramakrishna">
              <organization/>
            </author>
            <author initials="A." surname="Chiriac">
              <organization/>
            </author>
            <date year="2025" month="August"/>
          </front>
        </reference>
        <reference anchor="SATU" target="https://datatracker.ietf.org/doc/draft-ietf-satp-usecases/">
          <front>
            <title>Secure Asset Transfer (SAT) Use Cases, IETF, draft-ietf-satp-usecases-06</title>
            <author initials="V." surname="Ramakrishna">
              <organization/>
            </author>
            <author initials="T." surname="Hardjono">
              <organization/>
            </author>
            <author initials="C." surname="Liu">
              <organization/>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="Abebe19" target="https://arxiv.org/abs/1911.01064">
          <front>
            <title>Enabling Enterprise Blockchain Interoperability with Trusted Data Transfer (Middleware 2019 - Industry Track)</title>
            <author initials="E." surname="Abebe">
              <organization/>
            </author>
            <author initials="D." surname="Behl">
              <organization/>
            </author>
            <author initials="C." surname="Govindarajan">
              <organization/>
            </author>
            <author initials="Y." surname="Hu">
              <organization/>
            </author>
            <author initials="D." surname="Karunamoorthy">
              <organization/>
            </author>
            <author initials="P." surname="Novotny">
              <organization/>
            </author>
            <author initials="V." surname="Pandit">
              <organization/>
            </author>
            <author initials="V." surname="Ramakrishna">
              <organization/>
            </author>
            <author initials="C." surname="Vecchiola">
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="BVGC20" target="https://arxiv.org/abs/2005.14282v2">
          <front>
            <title>A Survey on Blockchain Interoperability: Past, Present, and Future Trends</title>
            <author initials="R." surname="Belchior">
              <organization/>
            </author>
            <author initials="A." surname="Vasconcelos">
              <organization/>
            </author>
            <author initials="S." surname="Guerreiro">
              <organization/>
            </author>
            <author initials="M." surname="Correia">
              <organization/>
            </author>
            <date year="2020" month="May"/>
          </front>
        </reference>
        <reference anchor="Clar88">
          <front>
            <title>The Design Philosophy of the DARPA Internet Protocols, ACM Computer Communication Review, Proc SIGCOMM 88, vol. 18, no. 4, pp. 106-114</title>
            <author initials="D." surname="Clark">
              <organization/>
            </author>
            <date year="1988" month="August"/>
          </front>
        </reference>
        <reference anchor="HLP19" target="https://doi:10.1109/TEM.2019.2920154">
          <front>
            <title>Towards an Interoperability Architecture for Blockchain Autonomous Systems, IEEE Transactions on Engineering Management</title>
            <author initials="T." surname="Hardjono">
              <organization/>
            </author>
            <author initials="A." surname="Lipton">
              <organization/>
            </author>
            <author initials="A." surname="Pentland">
              <organization/>
            </author>
            <date year="2019" month="June"/>
          </front>
        </reference>
        <reference anchor="HS2019" target="https://doi.org/10.3389/fbloc.2019.00024">
          <front>
            <title>Decentralized Trusted Computing Base for Blockchain Infrastructure Security, Frontiers Journal, Special Issue on Blockchain Technology, Vol. 2, No. 24</title>
            <author initials="T." surname="Hardjono">
              <organization/>
            </author>
            <author initials="N." surname="Smith">
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="HTLC21" target="https://en.bitcoin.it/wiki/Hash_Time_Locked_Contracts">
          <front>
            <title>Hash Time Locked Contracts, Bitcoin Wiki</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SRC84">
          <front>
            <title>End-to-End Arguments in System Design, ACM Transactions on Computer Systems, vol. 2, no. 4, pp. 277-288</title>
            <author initials="J." surname="Saltzer">
              <organization/>
            </author>
            <author initials="D." surname="Reed">
              <organization/>
            </author>
            <author initials="D." surname="Clark">
              <organization/>
            </author>
            <date year="1984" month="November"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
