Affiliation:
1. HMG Consulting, Saratoga, CA
Abstract
In ancient times, wax seals impressed with signet rings were affixed to documents as evidence of their authenticity. A digital counterpart is a message authentication code fixed firmly to each important document. If a digital object is sealed together with its own audit trail, each user can examine this evidence to decide whether to trust the content---no matter how distant this user is in time, space, and social affiliation from the document's source.We propose an architecture and design that accomplish this: encapsulation of digital object content with metadata describing its origins, cryptographic sealing, webs of trust for public keys rooted in a forest of respected institutions, and a certain way of managing information identifiers. These means will satisfy emerging needs in civilian and military record management, including medical patient records, regulatory records for aircraft and pharmaceuticals, business records for financial audit, legislative and legal briefs, and scholarly works.This is true for any kind of digital object, independent of its purposes and of most data type and representation details, and provides every kind of user---information authors and editors, librarians and collection managers, and information consumers---with autonomy for implied tasks. Our prototype will conform to applicable standards, will be interoperable over most computing bases, and will be compatible with existing digital library software.The proposed architecture integrates software that is mostly available and widely accepted.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Science Applications,General Business, Management and Accounting,Information Systems
Reference63 articles.
1. Arms W. Y. 1995. Key Concepts in the Architecture of the Digital Library. D-Lib Magazine (July).]] Arms W. Y. 1995. Key Concepts in the Architecture of the Digital Library. D-Lib Magazine (July).]]
2. Beagrie N. Bellinger M. Dale R. Doerr M. Hedstrom M. Jones M. Kenney A. Lupovici C. Russell K. Webb C. and Woodyard D. 2002. Trusted Digital Repositories: Attributes and Responsibilities RLG-OCLC Report http://www.rlg.org/longterm/repositories.pdf.]] Beagrie N. Bellinger M. Dale R. Doerr M. Hedstrom M. Jones M. Kenney A. Lupovici C. Russell K. Webb C. and Woodyard D. 2002. Trusted Digital Repositories: Attributes and Responsibilities RLG-OCLC Report http://www.rlg.org/longterm/repositories.pdf.]]
3. Bearman D. and Sochats K. 1996. Metadata Requirements for Evidence. http://www.archimuse.com/papers/nhprc/BACartic.html. http://www.archimuse.com/papers/nhprc/meta96.html.]] Bearman D. and Sochats K. 1996. Metadata Requirements for Evidence. http://www.archimuse.com/papers/nhprc/BACartic.html. http://www.archimuse.com/papers/nhprc/meta96.html.]]
4. Bearman D. and Trant J. 1998. Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process. D-Lib Magazine (June).]] Bearman D. and Trant J. 1998. Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process. D-Lib Magazine (June).]]
5. Linking to the Appropriate Copy: Report of a DOI-Based Prototype;Beit-Arie O.;D-Lib Magazine,2001
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献