Advertisement

Authenticity

  • David GiarettaEmail author
Chapter

Abstract

Much has been written about Authenticity . However in order to create tools which can be relied upon and which are practical we must achieve the following

Keywords

Digital Object Information Object Significant Property Information Property Digital Resource 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 24.
  2. 90.
    van der Hoeven J, van Wijngaarden H (2005) Modular emulation as a long-term preservation strategy for digital objects. Paper presented at the International Web Archiving Workshop (IWAW’05), Vienna, Austria, 2005. Available from http://www.iwaw.net/05/papers/iwaw05-hoeven.pdf
  3. 150.
    Handle System web site http://www.handle.net/
  4. 151.
    DOI (Digital Object Identifier system) http://www.doi.org/
  5. 152.
    PURL (Persistent Uniform Resource Locators) http://purl.org
  6. 153.
  7. 154.
    N2T (Name-To-Thing resolver) http://n2t.info/
  8. 155.
    UNESCO, Convention concerning the protection of the world cultural and natural heritage, 17th Session General Conference, 16 November 1972, ParisGoogle Scholar
  9. 156.
    Garrett J, Waters D (eds) (1996). Preserving Digital Information, Report of the Task Force on Archiving of Digital Information commissioned by The Commission on Preservation and Access and The Research Libraries Group. Available from http://www.ifla.org/documents/libraries/net/tfadi-fr.pdf
  10. 157.
  11. 158.
    Dale R (2007) Mapping of Audit & Certification Criteria for CRL Meeting (15-16 January 2007). Available from http://wiki.digitalrepositoryauditandcertification.org/pub/Main/ReferenceInputDocuments/TRAC -Nestor-DCC-criteria_mapping.doc
  12. 159.
    Giaretta D (2008) Comparison of OAIS and the Chicago Meeting 10 points. Available from http://wiki.digitalrepositoryauditandcertification.org/bin/view/Main/ComparisonOaisAndChicago10Points
  13. 160.
    nestor Working Group Trusted Repositories – Certification, (2006), Catalogue of Criteria for Trusted Digital Repositories. English version retrieved from http://edoc.hu-berlin.de/series/nestor-materialien/8en/PDF/8en.pdf
  14. 161.
    National Science Foundation Cyberinfrastructure Council (NSF, 2007), Cyberinfrastructure Vision for 21st Century Discovery. Retrieved from http://www.nsf.gov/pubs/2007/nsf0728/nsf0728.pdf
  15. 162.
    Open Archival Information System (OAIS) – Reference Model, ISO 14721:2003, (2003). Available from http://public.ccsds.org/publications/archive/650x0b1.pdf or later version
  16. 163.
    RLG-OCLC (2002) Report on Trusted Digital Repositories: Attributes and Responsibilities. Available from http://www.oclc.org/programs/ourwork/past/trustedrep/repositories.pdf
  17. 164.
    Ross S., Bütikofer N, McHugh A (2006), DCC Comments on RLG/NARA Audit and Certification Checklist. Available from http://wiki.digitalrepositoryauditandcertification.org/pub/Main/ReferenceInputDocuments/Ross_McHugh_Buetikofer_comments_RLGNARA_AUDIT_ver2.pdf
  18. 165.
    TRAC (2007), Trustworthy Repositories Audit & Certification: Criteria and Checklist. Available from http://www.crl.edu/PDF/trac.pdf
  19. 166.
    Buneman OP, Khanna S, Tan W-C. On the Propagation of Deletions and Annotations through Views. Proceedings of 21st ACM Symposium on Principles of Database Systems.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  1. 1.STFC and Alliance for Permanent AccessYetminster, DorsetUK

Personalised recommendations