Information Technology Reference
In-Depth Information
Fig. 13.3 Types of
authenticity step
ReferenceStep
ProvenanceStep
AuthStep
FixityStep
ContextStep
AccessRightsStep
Since an AS involves a decision followed by an action, it is expected that it
contains at least information about:
the criteria that must be satisfied in taking the decision
good practices or methodologies that must be followed
the actors who are entitled to take the decision.
Detailed examples are given in Sect. 13.7.6 .
Moreover an AS is defined (possibly) following Recommendations and is
disseminated as established by a Dissemination Policy (Fig. 13.4 ):
AuthenticityRecommendation
basedUpon
AuthStep
disseminatedThrough
Dissemination
Fig. 13.4 Authenticity step
Search WWH ::




Custom Search