Skip to main content

CLI for creating, validating, and signing Unit of Assurance evidence packages for computational modeling and simulation credibility

Project description

Unit of Assurance (UofA)

PyPI version validate examples License: Apache 2.0

The Unit of Assurance is the smallest independently verifiable bundle of credibility evidence for computational modeling and simulation (CM&S). It packages the credibility decision — who judged what, against what criteria, using what evidence, with what result — as a signed, provenance-linked, machine-verifiable engineering artifact.

Conference Attendees: Run the 30-Second Demo

pip install uofa
uofa demo

The bundled fixture exercises the full C1 (signature + integrity) + C2 (SHACL) + C3 (Jena rule engine) pipeline against a small pre-computed UofA artifact — no Java install, no LLM runtime, no internet required. Use it to verify "yes, this tool actually does what the speaker claimed" in under a minute.

When you're ready to encode your own evidence, see the Quick Start below.

Quick Start: Create Your Own UofA

# 1. Install the uofa CLI (one command — bundles Python deps, the rule
#    engine JAR, and an OpenJDK 17 JRE inside the wheel; no Java or Maven
#    install required).
pip install uofa

# 2. Import from Excel (fastest on-ramp for practitioners)
uofa import my-assessment.xlsx --sign --key keys/research.key --check

# — OR — scaffold from a JSON-LD template
uofa init my-project
# Edit my-project/my-project-cou1.jsonld — fill in your project details
uofa sign my-project/my-project-cou1.jsonld --key my-project/keys/my-project.key
uofa check my-project/my-project-cou1.jsonld

Platform wheels are published for macOS (arm64), Linux (x86_64 + aarch64), and Windows (x86_64). Intel-Mac users install the py3-none-any wheel and provide a system Java 17 (brew install openjdk@17). The uofa[extract] extra adds the LLM-backed prose-to-UofA pipeline; see uofa setup --help for one-time runtime installation.

New to UofA? See the Onboarding Guide for a step-by-step walkthrough (and a zero-install Codespaces option), or study the Morrison demo below.


Why UofA?

UofA exists because the credibility frameworks are not the problem. ASME V&V 40, NASA-STD-7009B, and the FDA's 2023 guidance on CM&S credibility provide clear instructions for how to assess simulation credibility. The problem is the last mile: there is no standardized construct for packaging, transmitting, and verifying the evidence and decisions those assessments produce.

The result is predictable. Credibility decisions live in prose PDFs. Evidence is scattered across tools. Provenance is partial. Audit packaging is manual. And reviewers catch quality gaps by intuition rather than automation.

UofA addresses this through three contributions:

Contribution What it does Mechanism
C1 — Decision as artifact Captures the credibility decision as a portable, tool-independent object with provenance lineage and integrity guarantees JSON-LD + PROV-DM + SHA-256 hash + ed25519 digital signatures
C2 — Completeness enforcement Defines what a UofA must contain at each rigor level and enforces it as a computable constraint SHACL profiles (Minimal / Complete) with format-validated integrity fields
C3 — Quality gates Detects substantive credibility gaps — missing UQ, orphan claims, acceptance criteria gaps — including compound risks that no individual query can find Jena forward-chaining rule engine with compound inference

Live Demo: Morrison Blood Pump (FDA V&V 40 Case Study)

The packs/vv40/examples/morrison/ directory contains complete, working UofA evidence packages built from Morrison et al. (2019) — an FDA OSEL co-authored V&V 40 credibility assessment for a centrifugal blood pump. This is the most widely cited V&V 40 worked example.

What the demo shows:

Morrison prose assessment          →  UofA structured evidence package
  "model deemed credible"               JSON-LD with 13 V&V 40 factors,
  scattered across 10 pages              provenance chain, integrity hash,
  of journal article                     machine-verifiable in 30 seconds

Run it yourself:

pip install uofa     # bundles the rule engine JAR + an OpenJDK 17 JRE

# Run the full C1 + C2 + C3 pipeline in one command
uofa check packs/vv40/examples/morrison/cou1/uofa-morrison-cou1.jsonld

That single command runs three checks:

Step Command What it does
C2 uofa shacl FILE SHACL Complete profile validation — all required fields present
C1 uofa verify FILE SHA-256 hash + ed25519 signature verification — content untampered
C3 uofa rules FILE Jena rule engine — 23 forward-chaining rules (21 core + 2 compound) detect quality gaps

The bundled JAR + JRE inside the wheel mean no Maven, no separate Java install, and no --build flag is needed. Source-tree contributors can still build the JAR via cd src/weakener-engine && mvn package and run from their own checkout — the bundled JRE only activates inside an installed wheel.

What the rule engine finds on Morrison COU1 (11 weakeners across 5 patterns):

Pattern Severity Hits What it detects
W-EP-02 High 3 Validation result has no prov:wasGeneratedBy — generation activity is missing
W-AL-01 High 3 Validation result has no uncertainty quantification — aleatory uncertainty is uncharacterized
W-AR-05 High 3 Validation result has no comparedAgainst link — comparator data source is absent
W-CON-04 Medium 1 Complete profile with no sensitivity analysis linked
W-ON-02 High 1 Context of Use lacks both applicability constraint and operating envelope

The catalog includes 23 weakener patterns spanning epistemic, aleatoric, ontological, structural, consistency, provenance, and argumentation categories. Run uofa catalog to list the full set. Morrison COU1 fires 5 of those 23 — the more risky COU2 fires a different 6 patterns including 2 Critical compound rules. See the divergence below.

The compound rules fire on the output of the core rules — this is chained forward-chaining inference that standalone SPARQL queries cannot produce. Same model, same data, same rules: the rule engine reasons about the interactions between gaps, not just the gaps themselves.

Want to see the same divergence mechanism in aerospace? A parallel NASA-STD-7009B case study on an HPT turbine-blade CHT model lives at docs/examples/hpt-blade-cht.md.


COU Divergence: uofa diff

Morrison contains two Contexts of Use assessing the same CFD model:

  • COU1 (CPB, Class II, Model Risk Level 2) → Decision: Accepted
  • COU2 (VAD, Class III, Model Risk Level 5) → Decision: Not accepted

Same model. Same experimental data. Different credibility requirements driven by different model risk. The uofa diff command surfaces this divergence automatically:

uofa diff packs/vv40/examples/morrison/cou1/uofa-morrison-cou1.jsonld \
         packs/vv40/examples/morrison/cou2/uofa-morrison-cou2.jsonld
════════════════════════════════════════════════════════
  COU Divergence Analysis
════════════════════════════════════════════════════════

                      COU A                             COU B
                Name  COU1: Cardiopulmonary bypass use (Class II)  COU2: Ventricular assist device use (Class III)
        Device class  Class II                          Class III
    Model risk level  MRL 2                             MRL 5
            Decision  Accepted                          Not accepted
     Assurance level  Medium                            Low
           Weakeners  5                                 6

══ Weakener Patterns (8) ══
  ┌────────────────────────────────────────────────────────────────┐
  │   Pattern    │  Severity  │  COU A  │  COU B  │    Status    │
  ├──────────────┼────────────┼─────────┼─────────┼──────────────┤
  │ W-AL-01      │ [High]     │   ✓     │   ✗     │ ◆ divergent  │
  │ W-AL-02      │ [Medium]   │   ✗     │   ✓     │ ◆ divergent  │
  │ W-AR-05      │ [High]     │   ✓     │   ✗     │ ◆ divergent  │
  │ W-CON-04     │ [Medium]   │   ✓     │   ✓     │   same       │
  │ W-EP-02      │ [High]     │   ✓     │   ✗     │ ◆ divergent  │
  │ W-EP-04      │ [High]     │   ✗     │   ✓     │ ◆ divergent  │
  │ W-ON-02      │ [High]     │   ✓     │   ✓     │   same       │
  │ W-PROV-01    │ [Critical] │   ✗     │   ✓     │ ◆ divergent  │
  └──────────────┴────────────┴─────────┴─────────┴──────────────┘

══ Compound Patterns (1) ══
  ┌────────────────────────────────────────────────────────────────┐
  │   Pattern    │  Severity  │  COU A  │  COU B  │    Status    │
  ├──────────────┼────────────┼─────────┼─────────┼──────────────┤
  │ COMPOUND-01  │ [Critical] │   ✗     │   ✓     │ ◆ divergent  │
  └──────────────┴────────────┴─────────┴─────────┴──────────────┘

══ Summary ══
  COU A (COU1: Cardiopulmonary bypass use (Class II)):
    [High] 4
    [Medium] 1
  COU B (COU2: Ventricular assist device use (Class III)):
    [Critical] 2
    [High] 2
    [Medium] 2

  7 divergence(s) detected

The full report includes a per-divergence "Divergence Explanations" block with the human-readable reason each pattern does or doesn't fire on each side. The headline: COU2 (the higher-risk Ventricular Assist Device application) trips a Critical W-PROV-01 (broken provenance chain) and a Critical COMPOUND-01 (Critical+High coexistence) that don't fire under COU1's lower MRL — even though COU1 has more raw weakeners by count. The C3 engine is correctly weighting risk-driven severity, not raw frequency.


Standards Alignment

UofA is grounded in existing standards rather than inventing new ones:

  • ASME V&V 40-2018 — Credibility factors, model risk framework, and the Context of Use (COU) concept that drives per-factor assessment
  • FDA 2023 Final Guidance on CM&S Credibility — Regulatory expectations for credibility evidence in medical device submissions
  • NASA-STD-7009B — CMS credibility assessment standard for models and simulations
  • W3C PROV-DM / PROV-O — Provenance data model for artifact lineage
  • W3C SHACL — Shapes Constraint Language for RDF graph validation
  • JSON-LD 1.1 — Linked data serialization that stays human-readable

Integrity Verification

Every UofA carries a real cryptographic hash and digital signature — not placeholders.

Level What it checks Mechanism
Format gate Hash and signature are well-formed SHACL sh:pattern regex on both Minimal and Complete profiles
Content verification Hash matches the canonical document content uofa verify recomputes SHA-256 from JSON canonical form
Cryptographic signature Document was signed by the declared authority ed25519 signature verification against the repo public key
# Mint a sealed UofA (sign after edits)
uofa sign packs/vv40/examples/morrison/cou1/uofa-morrison-cou1.jsonld --key keys/research.key

# Verify integrity
uofa verify packs/vv40/examples/morrison/cou1/uofa-morrison-cou1.jsonld

Placeholder strings (e.g., sha256:placeholder...) fail SHACL validation by design — a UofA claiming ProfileComplete must carry a real hash.


The Jena Rule Engine (C3)

Quality gap detection uses Apache Jena forward-chaining rules, not just SPARQL queries. The rule engine operates in two levels:

Level 1 — Core detection rules (21 patterns) match structural patterns against the evidence graph. Categories include epistemic (W-EP-), aleatoric (W-AL-), ontological (W-ON-), structural (W-SI-), consistency (W-CON-), provenance (W-PROV-), and argumentation (W-AR-*). Run uofa catalog for the full list with descriptions.

Level 2 — Compound inference rules (2 active) fire on the output of Level 1 rules:

Rule What it detects
COMPOUND-01 Critical + High weakeners coexist → escalated compound risk
COMPOUND-03 Declared assurance level contradicts detected Critical gaps

(COMPOUND-02 ships in the rules file but is currently commented out pending design review; uofa catalog filters it from listing output.)

The compound rules are the key differentiator versus SPARQL. They reason about the interactions between gaps — something that requires chained forward-chaining inference. All weakener rules evaluate in a single Jena forward-chaining pass, so compound rules can reason over the full weakener set.

For the data shape (Minimal vs. Complete profiles, CredibilityFactor, WeakenerAnnotation), see docs/profiles.md.


Plain-language explanations: --explain

uofa rules, check, diff, and shacl accept an --explain flag that adds a plain-language interpretation block to the structured output. The deterministic analysis remains the source of truth; the explanation is a human-readable layer for regulatory affairs and validation engineers.

uofa rules my-package.jsonld --explain
uofa rules my-package.jsonld --explain --explain-max-items 3
uofa rules my-package.jsonld --explain --explain-format json

Default backend is bundled Ollama (qwen3.5:4b, local-only, free). For higher quality or larger context, configure a remote backend in uofa.toml or override per invocation:

uofa rules my-package.jsonld --explain \
    --explain-backend anthropic \
    --explain-model claude-sonnet-5-2026
# requires ANTHROPIC_API_KEY in environment

Results are cached at ~/.uofa/cache/explain.db — a second invocation on the same input completes in <100 ms. Standalone re-interpretation of cached output: uofa explain --from-file cache.json.

Full documentation:


Excel Import: The Practitioner On-Ramp

Simulation engineers fill an Excel workbook, run one command, and get a signed, validated JSON-LD evidence package. The import pipeline handles URI generation, factor standard assignment, provenance tracking, and optional signing + validation in a single invocation.

pip install -e '.[excel]'    # one-time: adds openpyxl dependency

# Import from Excel → JSON-LD, sign, and validate in one step
uofa import my-assessment.xlsx --sign --key keys/research.key --check --pack vv40

The Excel template has 5 sheets: Assessment Summary, Model & Data, Validation Results, Credibility Factors, and Decision. Each pack provides a pre-populated template with locked factor names and dropdown validation. See packs/vv40/templates/uofa-starter-filled.xlsx for a complete filled example.


Domain Packs

SHACL shapes, Jena rules, templates, and extraction prompts are organized into domain packs under packs/. The core pack ships with standards-agnostic credibility assessment rules (23 weakener patterns). The vv40 pack provides the ASME V&V 40-2018 factor taxonomy (13 factors), and the nasa-7009b pack provides the NASA-STD-7009B factor taxonomy (19 factors, including 6 NASA-only lifecycle factors).

uofa packs            # list installed packs + counts
uofa check FILE --pack vv40                  # use V&V 40
uofa check FILE --pack vv40 --pack nasa-7009b  # combine packs

The --pack flag on any command switches the active pack(s). Multiple packs can be specified to combine factor taxonomies and rules. Per-project rules files next to the input file still take precedence over the pack default. See packs/README.md for the full pack contract.


Prerequisites

pip install uofa             # CLI + bundled JAR + bundled JRE; nothing else needed
pip install 'uofa[excel]'    # adds openpyxl for `uofa import`
pip install 'uofa[extract]'  # adds litellm + pdfplumber + python-docx for `uofa extract`
Tool Purpose When you need it
Python 3.10+ Runtime Always
Java 17+ Jena rule engine (C3) Only on Intel macOS (where the bundled JRE doesn't ship) or in source-tree dev when running outside the wheel
Maven 3.8+ Build the Jena JAR Only when developing on the rule engine itself

For a zero-install try-it-out path, see docs/onboarding.md.


Working with Your Own UofA

# Full pipeline (C1 + C2 + C3) on your file
uofa check path/to/your-uofa.jsonld

# Individual steps
uofa shacl  path/to/your-uofa.jsonld          # C2: SHACL validation
uofa verify path/to/your-uofa.jsonld          # C1: Hash + signature check
uofa rules  path/to/your-uofa.jsonld          # C3: Jena weakener detection

# Sign with your own key
uofa sign path/to/your-uofa.jsonld --key keys/your.key

# Compare weakener profiles across two COUs
uofa diff uofa-cou1.jsonld uofa-cou2.jsonld

Full command reference (extract, import, init, validate, packs, migrate, schema, …) lives in docs/onboarding.md.


Further reading


License

Apache License, Version 2.0 — see LICENSE for the full text and NOTICE for bundled-software attributions.

The full project (UofA ontology, JSON-LD context, SHACL shapes, reference examples, Jena rule implementations, and the CLI) is licensed under Apache 2.0. Bundled third-party components retain their own licenses as enumerated in NOTICE (e.g., OpenJDK GPLv2-CE, Ollama MIT).


Contributing

Contributions are welcome, especially real-world UofA examples from practitioners working with CM&S credibility assessment. If you are preparing a CM&S-supported regulatory submission and want to explore UofA packaging for your evidence, please reach out.

For contributors, see CONTRIBUTING.md, docs/repo-layout.md, and docs/onboarding.md.

Website: crediblesimulation.com

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

uofa-0.7.1.tar.gz (4.5 MB view details)

Uploaded Source

Built Distributions

If you're not sure about the file name format, learn more about wheel file names.

uofa-0.7.1-py3-none-win_amd64.whl (63.3 MB view details)

Uploaded Python 3Windows x86-64

uofa-0.7.1-py3-none-manylinux_2_28_x86_64.whl (67.2 MB view details)

Uploaded Python 3manylinux: glibc 2.28+ x86-64

uofa-0.7.1-py3-none-manylinux_2_28_aarch64.whl (66.4 MB view details)

Uploaded Python 3manylinux: glibc 2.28+ ARM64

uofa-0.7.1-py3-none-macosx_11_0_arm64.whl (62.9 MB view details)

Uploaded Python 3macOS 11.0+ ARM64

uofa-0.7.1-py3-none-any.whl (19.7 MB view details)

Uploaded Python 3

File details

Details for the file uofa-0.7.1.tar.gz.

File metadata

  • Download URL: uofa-0.7.1.tar.gz
  • Upload date:
  • Size: 4.5 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for uofa-0.7.1.tar.gz
Algorithm Hash digest
SHA256 e89138840522bb3d65f745d2e14e62ca4e7bfca39cb36dcc398b3e9ae90c3501
MD5 38c9ae47b0d09b259b7134658d69e4b9
BLAKE2b-256 5fe4597162d4bc7d31ce00895af065f11bc239d3af49a1271f2426c70e6a0eaa

See more details on using hashes here.

Provenance

The following attestation bundles were made for uofa-0.7.1.tar.gz:

Publisher: release-wheels.yml on cloudronin/uofa

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file uofa-0.7.1-py3-none-win_amd64.whl.

File metadata

  • Download URL: uofa-0.7.1-py3-none-win_amd64.whl
  • Upload date:
  • Size: 63.3 MB
  • Tags: Python 3, Windows x86-64
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for uofa-0.7.1-py3-none-win_amd64.whl
Algorithm Hash digest
SHA256 af22e009d94f43b8510544a1ce40d195ebae6be8d1fdac026facd6ad7697748b
MD5 c2db50d506ebf5ca23282a226281c649
BLAKE2b-256 d70912a21c4dbfbd21b87076c0dd51e252a392f29aad24a85770b57b769b8164

See more details on using hashes here.

Provenance

The following attestation bundles were made for uofa-0.7.1-py3-none-win_amd64.whl:

Publisher: release-wheels.yml on cloudronin/uofa

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file uofa-0.7.1-py3-none-manylinux_2_28_x86_64.whl.

File metadata

  • Download URL: uofa-0.7.1-py3-none-manylinux_2_28_x86_64.whl
  • Upload date:
  • Size: 67.2 MB
  • Tags: Python 3, manylinux: glibc 2.28+ x86-64
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for uofa-0.7.1-py3-none-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 66604fcf29dabca36d6d794aa32d6667ad8b002b3775667589009d4d5a172062
MD5 8761b9539b3b3705ca022d32be46e612
BLAKE2b-256 08115d8adb604646ff2ff6eddbe48ef2610bfa727f2504874fefe5a77479cd36

See more details on using hashes here.

Provenance

The following attestation bundles were made for uofa-0.7.1-py3-none-manylinux_2_28_x86_64.whl:

Publisher: release-wheels.yml on cloudronin/uofa

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file uofa-0.7.1-py3-none-manylinux_2_28_aarch64.whl.

File metadata

File hashes

Hashes for uofa-0.7.1-py3-none-manylinux_2_28_aarch64.whl
Algorithm Hash digest
SHA256 cca6cab381fbc06b7a39a765c2aa289ca31b144daa994082575282e1f0945ed5
MD5 3052de162923b892c45335100569d722
BLAKE2b-256 0b3a4cc3f8cfcf67e7ed33997718c8c7325d78804a6b345f1f5a9afc53a24de1

See more details on using hashes here.

Provenance

The following attestation bundles were made for uofa-0.7.1-py3-none-manylinux_2_28_aarch64.whl:

Publisher: release-wheels.yml on cloudronin/uofa

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file uofa-0.7.1-py3-none-macosx_11_0_arm64.whl.

File metadata

  • Download URL: uofa-0.7.1-py3-none-macosx_11_0_arm64.whl
  • Upload date:
  • Size: 62.9 MB
  • Tags: Python 3, macOS 11.0+ ARM64
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for uofa-0.7.1-py3-none-macosx_11_0_arm64.whl
Algorithm Hash digest
SHA256 55b4733dccaff6b1b0a2b47863d7bc770eac6e10e6290f457e184a6c99773bbe
MD5 9f518dd8bb5676d3af25cf50996fcab4
BLAKE2b-256 56a1d48fc2d3020e393eb9832bbd9276a1788e34ad695b3d66089912e3673a7c

See more details on using hashes here.

Provenance

The following attestation bundles were made for uofa-0.7.1-py3-none-macosx_11_0_arm64.whl:

Publisher: release-wheels.yml on cloudronin/uofa

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file uofa-0.7.1-py3-none-any.whl.

File metadata

  • Download URL: uofa-0.7.1-py3-none-any.whl
  • Upload date:
  • Size: 19.7 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for uofa-0.7.1-py3-none-any.whl
Algorithm Hash digest
SHA256 d8219b395ae7b86611a655d9cd11df96457f05a7e4839508fe229da64a42077d
MD5 02cf68bf0ff2429c18607d39f9bc04d9
BLAKE2b-256 a9246f2d8c9aba351e6247c378e53d917f272246339e3d41e6ace02ab88999df

See more details on using hashes here.

Provenance

The following attestation bundles were made for uofa-0.7.1-py3-none-any.whl:

Publisher: release-wheels.yml on cloudronin/uofa

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page