Secure storage and secure transmission of data integrate many ideas which often need to be composed separately in different applications. Data provenance capabilities add the need for further composable components. We make an effort to breakout ideas into independent specifications so that they can be integrated as appropriate for different projects.