Advertisement

Who Is Doing a Good Job? Audit and Certification

  • David GiarettaEmail author
Chapter

Abstract

The Preserving Digital Information report of the Task Force on Archiving of Digital Information [243] declared,
  • a critical component of digital archiving infrastructure is the existence of a sufficient number of trusted organizations capable of storing, migrating, and providing access to digital collections.

  • process of certification for digital archives is needed to create an overall climate of trust about the prospects of preserving digital information .

Keywords

Audit Process Certification Process Designate Community Digital Archive Consultative Committee 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 4.
    Digital Curation Centre (DCC), part funded by JISC. Web site http://www.dcc.ac.uk
  2. 6.
    Repository Audit and Certification Working Group http://wiki.digitalrepositoryauditandcertification.org
  3. 242.
    Davidson SB, Freire J (2008) Provenance and scientific workflows: challenges and opportunities. In: Procs of the 2008 ACM SIGMOD International Conference on Management of Data, pages 1345–1350. ACM.Google Scholar
  4. 243.
    Sunagawa E, Kozaki K, Kitamura Y, Mizoguchi R (2003) An Environment for Distributed Ontology Development Based on Dependency Management. In: Procs of the 2nd International Semantic Web Conference (ISWC’03), pages 453–468.Google Scholar
  5. 244.
    Fox MS, Huang J (2003) Knowledge provenance: An approach to modelling and maintaining the evolution and validity of knowledge. EIL Technical Report, University of Toronto. Available from http://www.eil.utoronto.ca/km/papers/fox-kp1.pdf
  6. 245.
    Bobb N, Brandt SA, Hiatt A, Maltzahn C, Miller EL, Neeman A, Tuteja D (2005). Richer file system metadata using links and attributes. In: Procs of the 22nd IEEE/13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST’05), Monterey, California, April 2005.Google Scholar
  7. 246.
    Belguidoum M, Dagnat F (2007) Dependency Management in Software Component Deployment. In: Electronic Notes in Theoretical Computer Science, 182:17–32.Google Scholar
  8. 247.
    Franch X, Maiden NAM (2003) Modelling Component Dependencies to Inform their Selection. In :Procs of the 2nd International Conference on COTS-Based Software Systems, Springer.Google Scholar
  9. 248.
    Vieira M, Dias M, Richardson DJ (2001) Describing Dependencies in Component Access Points. In: Procs of the 23rd International Conference on Software Engineering (ICSE'01), Toronto, Canada, pages 115–118.Google Scholar
  10. 249.
    Vieira M, Richardson D (2002) Analyzing dependencies in large component-based systems. In: Procs of the 17th IEEE International Conference on Automated Service Engineering, ASE’02. Los Alamitos, CA, USA, 2002. IEEE Computer Society.Google Scholar
  11. 250.
    Walter M, Trinitis M, Karl W (2001) OpenSESAME: an intuitive dependability modelling environment supporting inter-component dependencies. In: Procs of Pacific Rim International Symposium on Dependable Computing, 76–83.Google Scholar
  12. 251.
    Tzitzikas Y, Flouris G (2007) Mind the (Intelligibily) Gap. In: Procs of the 11th European Conference on Research and Advanced Technology for Digital Libraries, (ECDL'07), Budapest, Hungary, September 2007. Springer-Verlag.Google Scholar
  13. 252.
    Kakas AC, Kowalski RA, Toni F (1998) The Role of Abduction in Logic Programming. In: Handbook of Logic in Artificial Intelligence and Logic Programming: Logic programming}, page 235Google Scholar
  14. 253.
    Console L , Dupre DT, Torasso P (1991). On the relationship between abduction and deduction. In: Journal of Logic and Computation. 1(5):661Google Scholar
  15. 254.
    Eiter T, Gottlob G (1995) The complexity of logic-based abduction. In: Journal of the ACM (JACM), 42(1):3–42.Google Scholar
  16. 255.
    Moreau L, Freire J, Myers J, Furelle J, Paulson P (2007) The Open Provenance Model, University of Southampton.Google Scholar
  17. 256.
    Theodoridou M, Tzitzikas Y, Doerr M, Marketakis Y, Melessanakis V (2010) Modelling and Querying Provenance by Extending CIDOC CRM. Journal of Distributed and Parallel Databases, 27:169–210.Google Scholar
  18. 257.
    Christiansen H, Dahl V (2004) Assumptions and abduction in Prolog. In: 3rd International Workshop on Multiparadigm Constraint Programming Languages, MultiCPL, Saint-Malo, France, September 2004Google Scholar
  19. 3.
    Digital Curation Centre (DCC), part funded by JISC. Web site http://www.dcc.ac.uk
  20. 5.
    CCSDS (Consultative Committee for Space Data Systems) web site http://www.ccsds.org

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  1. 1.STFC and Alliance for Permanent AccessYetminster, DorsetUK

Personalised recommendations