Information Technology Reference
In-Depth Information
appliedTo
AuthProtocol
ObjectType
workFl o w
AuthStep
Fig. 13.1 Authenticity protocol applied to object types
object type. It may be best to regard APs as advice/guidance, unless of course there
are legal requirements or community standards.
13.3.2 Authenticity Step (AS)
An AS is performed by an Actor, which can act either in an automatic (hardware,
software) or in a manual (person, organization) way (Fig. 13.2 ):
There can be several types of ASs. Following OAIS, we distinguish ASs based
on the kind of Preservation Description Information required to carry out the AS.
Consequently, we have five types of steps (Fig. 13.3 ):
Reference Step
Provenance Step
Fixity Step
Context Step
Access Rights Step
performedBy
Actor
AuthStep
Manual
Automatic
Fig. 13.2 Authenticity step
performed by actor
 
Search WWH ::




Custom Search