Information Technology Reference
In-Depth Information
1. Ensure Integrity of Content and Contextual Information
2. Ensure Authenticity of Content and Contextual
Information
Ensure Authorship
Identify Provenance
Evaluate Reliability
Component interfaces
AuthenticityManager
Authenticity Model Framework
Authenticity PACK
Authenticity PDS
Authenticity DRM
Component artefacts
Component UML diagram
Authenticity Conceptual Model - see Fig. 17.29
Authenticity Manager Interface - see Fig. 17.30
Authenticity and Provenance in Long Term Digital
Preservation:
Modelling and Implementation in Preservation Aware
Storage
Component specification
Component author
UU - University of Urbino (Italy)
InstanceOf
EventOccurrence
EventType
WorkFlow
AppliedTo
Allows
ObjectType
AuthProtocol
ExecutionReport
AuthProtocol
ExecutionEvaluation
AuthProtocol
Execution
AuthProtcol
AuthProtocolHistory
ExecutionOf
DocumentedBy
DocumentedBy
ReferenceStep
Integrity
Evaluation
ProvenanceStep
Identity
Evaluation
Wo rkFlo w
DocumentedBy
Experience
ExecutionOf
FixityStep
AuthStep
ExecutionReport
AuthStep
Execution
AuthStep
ContextStep
BestPractice
AccessRightsStep
Guideline
PerformedBy
BasedUpon
ExecutedBy
AuthRecommendations
Policy
Manual Actor
InstanceOf
Standard
ActorType
ActorOccurrence
Law
Automatic Actor
PerformedBy
...........
BasedUpon
Fig. 17.29 Authenticity conceptual model
17.12 Representation Information Toolkit
Tools for creating Representation Information have been extensively discussed in
Chap. 7 therefore this sub-section simply describes the shell which provides a more
uniform access to those tools.
Search WWH ::




Custom Search