Much has been written about Authenticity . However in order to create tools which can be relied upon and which are practical we must achieve the following


Digital Object Information Object Significant Property Information Property Digital Resource 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 24.
  2. 90.
    van der Hoeven J, van Wijngaarden H (2005) Modular emulation as a long-term preservation strategy for digital objects. Paper presented at the International Web Archiving Workshop (IWAW’05), Vienna, Austria, 2005. Available from
  3. 150.
    Handle System web site
  4. 151.
    DOI (Digital Object Identifier system)
  5. 152.
    PURL (Persistent Uniform Resource Locators)
  6. 153.
  7. 154.
    N2T (Name-To-Thing resolver)
  8. 155.
    UNESCO, Convention concerning the protection of the world cultural and natural heritage, 17th Session General Conference, 16 November 1972, ParisGoogle Scholar
  9. 156.
    Garrett J, Waters D (eds) (1996). Preserving Digital Information, Report of the Task Force on Archiving of Digital Information commissioned by The Commission on Preservation and Access and The Research Libraries Group. Available from
  10. 157.
  11. 158.
    Dale R (2007) Mapping of Audit & Certification Criteria for CRL Meeting (15-16 January 2007). Available from -Nestor-DCC-criteria_mapping.doc
  12. 159.
    Giaretta D (2008) Comparison of OAIS and the Chicago Meeting 10 points. Available from
  13. 160.
    nestor Working Group Trusted Repositories – Certification, (2006), Catalogue of Criteria for Trusted Digital Repositories. English version retrieved from
  14. 161.
    National Science Foundation Cyberinfrastructure Council (NSF, 2007), Cyberinfrastructure Vision for 21st Century Discovery. Retrieved from
  15. 162.
    Open Archival Information System (OAIS) – Reference Model, ISO 14721:2003, (2003). Available from or later version
  16. 163.
    RLG-OCLC (2002) Report on Trusted Digital Repositories: Attributes and Responsibilities. Available from
  17. 164.
    Ross S., Bütikofer N, McHugh A (2006), DCC Comments on RLG/NARA Audit and Certification Checklist. Available from
  18. 165.
    TRAC (2007), Trustworthy Repositories Audit & Certification: Criteria and Checklist. Available from
  19. 166.
    Buneman OP, Khanna S, Tan W-C. On the Propagation of Deletions and Annotations through Views. Proceedings of 21st ACM Symposium on Principles of Database Systems.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  1. 1.STFC and Alliance for Permanent AccessYetminster, DorsetUK

Personalised recommendations