Information Technology Reference
In-Depth Information
24.6.3.1 Next Steps
Develop an authenticity formalism
Develop international standards and common policies on authenticity and prove-
nance.
Creation of tools to capture evidence relevant to authenticity
Develop tools to map provenance to authenticity tools
Maintain the chain of evidence through (automated) digital audit (provenance)
trails by embedding support for capturing knowledge about the actual operations
performed
24.6.3.2 Final Destination
A set of standards and tools through which a user in the future can be provided
with evidence on which he/she may judge the degree of Authenticity which may
be attributed to a digital object.
24.6.3.3 Relevant Projects, Policies, Organisations, Activities
CASPAR( http://www.casparpreserves.eu/ ), SHAMAN ( http://www.shaman-ip.
eu/ ), nestor ( http://www.langzeitarchivierung.de/ )
24.6.4 Digital Rights
Ability to deal with Digital Rights correctly in a changing and evolving environ-
ment:
Allow the digital rights associated with an object to be presented in a consistent
way, taking into account the changes in legislation. There are several digital rights
expression languages in the academic community and commercial world - some
are being standardised - the infrastructure must be able to cope with this variety
and their evolution and possibly of the underlying rights. An associated problem
is the circumstance in which the licence to access the object (or without which the
required software is unusable) expires and the originating company no longer exists.
SCENARIO
A piece of software was produced by an inventor and is protected by a user key
which must be renewed every year. Several years after the death of the inventor
the software is needed by a researcher in another country with a different legal
system. What restrictions on usage are there under this rather different system?
Even if the software could legally be used, how can the appropriate software key
be created?
 
Search WWH ::




Custom Search