Abstract
Much has been written about Authenticity . However in order to create tools which can be relied upon and which are practical we must achieve the following
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
authenticity (plural authenticities)
1. The quality of being genuine or not corrupted from the original.
I hereby certify that this is an authentic copy.
2. Truthfulness of origins, attributions, commitments, sincerity, and intentions.
The painting was not authentic after all; it was just a copy.
3. (obsolete) The quality of being authentic (of established authority).
(Wiktionary definition from http://en.wiktionary.org/wiki/authenticity downloaded 14 Aug 2010)
Authenticity is a fundamental issue for the long-term preservation of digital objects: the relevance of authenticity as a preliminary and central requirement has been investigated by many international projects. Some focused on long-term preservation of authentic digital records in the e-government environment, and in scientific and cultural domains.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Drambora http://www.repositoryaudit.eu/
van der Hoeven J, van Wijngaarden H (2005) Modular emulation as a long-term preservation strategy for digital objects. Paper presented at the International Web Archiving Workshop (IWAW’05), Vienna, Austria, 2005. Available from http://www.iwaw.net/05/papers/iwaw05-hoeven.pdf
Handle System web site http://www.handle.net/
DOI (Digital Object Identifier system) http://www.doi.org/
PURL (Persistent Uniform Resource Locators) http://purl.org
Archival Resource Key (ARK ) http://www.ietf.org/internet-drafts/draft-kunze-ark-09.txt
N2T (Name-To-Thing resolver) http://n2t.info/
UNESCO , Convention concerning the protection of the world cultural and natural heritage, 17th Session General Conference, 16 November 1972, Paris
Garrett J, Waters D (eds) (1996). Preserving Digital Information, Report of the Task Force on Archiving of Digital Information commissioned by The Commission on Preservation and Access and The Research Libraries Group. Available from http://www.ifla.org/documents/libraries/net/tfadi-fr.pdf
CRL,(2007) Retrieved from http://www.crl.edu/content.asp?l1=13&l2=58&l3=162&l4=92
Dale R (2007) Mapping of Audit & Certification Criteria for CRL Meeting (15-16 January 2007). Available from http://wiki.digitalrepositoryauditandcertification.org/pub/Main/ReferenceInputDocuments/TRAC -Nestor-DCC-criteria_mapping.doc
Giaretta D (2008) Comparison of OAIS and the Chicago Meeting 10 points. Available from http://wiki.digitalrepositoryauditandcertification.org/bin/view/Main/ComparisonOaisAndChicago10Points
nestor Working Group Trusted Repositories – Certification, (2006), Catalogue of Criteria for Trusted Digital Repositories. English version retrieved from http://edoc.hu-berlin.de/series/nestor-materialien/8en/PDF/8en.pdf
National Science Foundation Cyberinfrastructure Council (NSF, 2007), Cyberinfrastructure Vision for 21st Century Discovery. Retrieved from http://www.nsf.gov/pubs/2007/nsf0728/nsf0728.pdf
Open Archival Information System (OAIS ) – Reference Model, ISO 14721:2003, (2003). Available from http://public.ccsds.org/publications/archive/650x0b1.pdf or later version
RLG-OCLC (2002) Report on Trusted Digital Repositories: Attributes and Responsibilities. Available from http://www.oclc.org/programs/ourwork/past/trustedrep/repositories.pdf
Ross S., Bütikofer N, McHugh A (2006), DCC Comments on RLG/NARA Audit and Certification Checklist. Available from http://wiki.digitalrepositoryauditandcertification.org/pub/Main/ReferenceInputDocuments/Ross_McHugh_Buetikofer_comments_RLGNARA_AUDIT_ver2.pdf
TRAC (2007), Trustworthy Repositories Audit & Certification: Criteria and Checklist. Available from http://www.crl.edu/PDF/trac.pdf
Buneman OP, Khanna S, Tan W-C. On the Propagation of Deletions and Annotations through Views. Proceedings of 21st ACM Symposium on Principles of Database Systems.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Giaretta, D. (2011). Authenticity . In: Advanced Digital Preservation. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16809-3_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-16809-3_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16808-6
Online ISBN: 978-3-642-16809-3
eBook Packages: Computer ScienceComputer Science (R0)