Trustworthy 100-year digital objects

Author:

Gladney Henry M.1

Affiliation:

1. HMG Consulting, Saratoga, CA

Abstract

In ancient times, wax seals impressed with signet rings were affixed to documents as evidence of their authenticity. A digital counterpart is a message authentication code fixed firmly to each important document. If a digital object is sealed together with its own audit trail, each user can examine this evidence to decide whether to trust the content---no matter how distant this user is in time, space, and social affiliation from the document's source.We propose an architecture and design that accomplish this: encapsulation of digital object content with metadata describing its origins, cryptographic sealing, webs of trust for public keys rooted in a forest of respected institutions, and a certain way of managing information identifiers. These means will satisfy emerging needs in civilian and military record management, including medical patient records, regulatory records for aircraft and pharmaceuticals, business records for financial audit, legislative and legal briefs, and scholarly works.This is true for any kind of digital object, independent of its purposes and of most data type and representation details, and provides every kind of user---information authors and editors, librarians and collection managers, and information consumers---with autonomy for implied tasks. Our prototype will conform to applicable standards, will be interoperable over most computing bases, and will be compatible with existing digital library software.The proposed architecture integrates software that is mostly available and widely accepted.

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Science Applications,General Business, Management and Accounting,Information Systems

Reference63 articles.

1. Arms W. Y. 1995. Key Concepts in the Architecture of the Digital Library. D-Lib Magazine (July).]] Arms W. Y. 1995. Key Concepts in the Architecture of the Digital Library. D-Lib Magazine (July).]]

2. Beagrie N. Bellinger M. Dale R. Doerr M. Hedstrom M. Jones M. Kenney A. Lupovici C. Russell K. Webb C. and Woodyard D. 2002. Trusted Digital Repositories: Attributes and Responsibilities RLG-OCLC Report http://www.rlg.org/longterm/repositories.pdf.]] Beagrie N. Bellinger M. Dale R. Doerr M. Hedstrom M. Jones M. Kenney A. Lupovici C. Russell K. Webb C. and Woodyard D. 2002. Trusted Digital Repositories: Attributes and Responsibilities RLG-OCLC Report http://www.rlg.org/longterm/repositories.pdf.]]

3. Bearman D. and Sochats K. 1996. Metadata Requirements for Evidence. http://www.archimuse.com/papers/nhprc/BACartic.html. http://www.archimuse.com/papers/nhprc/meta96.html.]] Bearman D. and Sochats K. 1996. Metadata Requirements for Evidence. http://www.archimuse.com/papers/nhprc/BACartic.html. http://www.archimuse.com/papers/nhprc/meta96.html.]]

4. Bearman D. and Trant J. 1998. Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process. D-Lib Magazine (June).]] Bearman D. and Trant J. 1998. Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process. D-Lib Magazine (June).]]

5. Linking to the Appropriate Copy: Report of a DOI-Based Prototype;Beit-Arie O.;D-Lib Magazine,2001

Cited by 16 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Investigating the Needs, Capabilities and Decision Making Mechanisms in Digital Preservation;Information Resources Management Journal;2013-07

2. Examining success factors in the adoption of digital object identifier systems;Electronic Commerce Research and Applications;2011-11

3. A Framework for the Assessment of the Trustworthiness of Digital Records over Time;2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications;2011-11

4. On the long-term retention of geometry-centric digital engineering artifacts;Computer-Aided Design;2011-07

5. Data sharing in the sciences;Annual Review of Information Science and Technology;2011

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3