You are right on track. So several chained mutable data items can be waiting on signatures from deterministic or non deterministic groups (network or apps) and coded clearly that way. Then these signatures add up along a graph and as they do they execute various methods as the MD makes the change the signatures allow.
So for instance ( a super simple naive example) , if we imagine MD items
A → Receives info from a human or IOT/AI etc. → Signs B
B → Receives a defined number of this verifiable data from known nodes/groups → Signs A
A → transfers a safecoin to X whoever X may be.
The network change is quite simple and subtle, basically MD items need to hold signatures until they accumulate. This can be done quite nicely if each sig has a unique identifier (UUID) and allowed then signers to remove that signature based on further inputs.
I hope that helps with NAL