Implementing Trusted Digital
نویسندگان
چکیده
Trusted digital repositories manage the integrity and authenticity of records through multiple generations of technology. They provide mechanisms to validate assertions about trustworthiness and provide the preservation processes that implement the required control and management capabilities. Today there are multiple technologies that can be used to build a digital repository that is capable of maintaining the authenticity and integrity of ingested documents. The approaches range from solutions based on data grids (Storage Resource Broker), to solutions based on digital library systems (DSpace and Fedora), to solutions based on rule-oriented environments (integrated Rule-Oriented Data System). These approaches optimize management of different components of a trusted digital repository. No single system currently provides all of the required functionality. This paper examines how rule-based systems can validate assertions of trustworthiness, presents the infrastructure components provided by the integrated Rule-Oriented Data System, and explores how rule-based approaches can be used to develop a theory of preservation.
منابع مشابه
Digital Repositories 1 Implementing Trusted Digital Repositories
Trusted digital repositories manage the integrity and authenticity of records through multiple generations of technology. They provide mechanisms to validate assertions about trustworthiness and provide the preservation processes that implement the required control and management capabilities. Today there are multiple technologies that can be used to build a digital repository that is capable o...
متن کاملA Java Implementation of a Multisignature Scheme
Multisignature protocols are digital signature schemes that allow a group of users to sign a message so that the signature thus produced is valid only if all the members of the group participate in the signature process. In general, these schemes need the collaboration of a Trusted Third Party, which computes and securely stores some of the parameters associated to the scheme. In this work, we ...
متن کاملImplementing Boot Control for Windows Vista
A digital forensic logging system must prevent the booting of unauthorized programs and the modification of evidence. Our previous research developed Dig-Force2, a boot control system for Windows XP platforms that employs API hooking and a trusted platform module. However, Dig-Force2 cannot be used for Windows Vista systems because the hooked API cannot monitor booting programs in user accounts...
متن کاملGroup Signatures in Practice
Group signature schemes allow a user to sign a message in an anonymous way on behalf of a group. In general, these schemes need the collaboration of a Key Generation Center or a Trusted Third Party, which can disclose the identity of the actual signer if necessary (for example, in order to settle a dispute). This paper presents the results obtained after implementing a group signature scheme us...
متن کاملImplementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms
Anonymity and privacy protection are very important issues for Trusted Computing enabled platforms. Protection mechanisms are required in order to hide activities of the trusted platforms when performing cryptography based transactions over the Internet, which would otherwise compromise the platform’s privacy and with it the users’s anonymity. In order to address this problem, the Trusted Compu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007