Skip to main content

Archiving Practices

  • Chapter
  • 1003 Accesses

Abstract

Digital preservation can be accomplished with no more than small extensions over information interchange and digital library (DL) technologies that are already widely deployed. Most of the software technology needed is already available, or soon will be, and is being standardized. This includes cryptographic tools for sealing information against surreptitious change, encoding rules for multimedia (e.g., MPEG292) and for scientific data, XML syntax for packaging digital objects, and semantic models encoded as sets of triplets.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hunter 1999, MPEG-7 Behind the Scenes.

    Google Scholar 

  2. Gill 2002, Re-inventing the Wheel? Standards, Interoperability and Digital Cultural Content.

    Google Scholar 

  3. For instance, Millar 1999. The Spirit of Total Archives. Koltun 1999, The Promise and Threat of Digital Options in an Archival Age.

    Google Scholar 

  4. Greenstein 2002, Next Generation Digital Libraries, http://www.vala.org.au/vala2002/2002pdf/01Grnstn.pdf. Lougee 2002, Diffuse Libraries, http://www.clir.org/pubs/reports/pub108/contents.html.

    Google Scholar 

  5. Fox 2002, Digital Libraries.

    Google Scholar 

  6. Dam 1996, Cyptography’s Role in Securing the Information Society. Menezes 1997, Handbook of Applied Cryptography. Naor 2004, Theory of Cryptography. Schneier 1996, Applied Cryptography.

    Google Scholar 

  7. Atkins 1996, Internet Security Professional Reference. Schäfer 2003, Security in Fixed and Wireless Networks. Vacca 1996, Internet Security Secrets.

    Google Scholar 

  8. Anderson 2001, Security Engineering.

    Google Scholar 

  9. Bauer 2002. Decrypted secrets: methods and maxims of cryptology. Kahn 1967, The Codebreakers. Singh 1999, The Code Book.

    Google Scholar 

  10. Menezes 1997, Handbook of Applied Cryptography, §1.5.

    Google Scholar 

  11. Eastlake 2002, Secure XML. Fegghi 1998, Digital Certificates. Knudsen 1998, Java Cryptography.

    Google Scholar 

  12. W3C 2002, XML-Signature Syntax and Processing, http://www.w3.org/TR/xmldsig-core/.

    Google Scholar 

  13. IEEE P1619, Security for Storage Data at Rest, http://www.t10.org/ftp/t10/document.04/04-146r0.pdf.

    Google Scholar 

  14. Bearman 1998, Authenticity of Digital Resources: Towarda Statement of Requirements.

    Google Scholar 

  15. Gerck 2000, Overview of Certification Systems, http://nma.com/papers/certover.pdf.

    Google Scholar 

  16. Lampson 1992, Authentication in Distributed Systems.

    Google Scholar 

  17. ISO Network Working Group 1999, Internet X.509 Public Key Infrastructure Certificate and CRL Profile, http://www.ipa.go.jp/security/rfc/RFC2459EN.html.

    Google Scholar 

  18. Ibid. §1.8.

    Google Scholar 

  19. Gauravaram 2006, The legal and practical implications of recent attacks on 128-bit cryptographic hash functions.

    Google Scholar 

  20. HP 2003, Identifier-Based Encryption, http://www.hpl.hp.com/research/ssrc/security/id/ibe/tutorial/briefs/IBE_tutorial.pdf.

    Google Scholar 

  21. Integris 2001, Electronic signature formats for long-term electronic signatures, http://www.ietf.org/rfc/rfc3126.txt. Buchman 2006, Perspectives for Cryptographic Long-Term Security. Apvrille 2002, XML Security Time Stamping Protocol, http://citeseer.ist.psu.edu/apvrille02xml.html.

    Google Scholar 

  22. Gerck 2000, Overview of Certification Systems. Ellison 2000, Naming and certificates

    Google Scholar 

  23. Burmester 2004, Is Hierarchical Public-Key Certification the Next Target for Hackers?

    Google Scholar 

  24. Ellison 2000, Risks of PKI.

    Google Scholar 

  25. Birrell 1986, A Global Authentication System without Global Trust. Integris 2001, Long-term electronic signatures. Lekkas 2004, Cumulative notarization for long-term preservation of digital signatures.

    Google Scholar 

  26. Caronni 2000, Walking the Web of Trust.

    Google Scholar 

  27. Just 1998, Some Time stamp Protocol Failures.

    Google Scholar 

  28. Bayer 1993, Improving the Efficiency and Reliability of Digital Time Stamping. Cipra 1993, Electronic Time Stamping.

    Google Scholar 

  29. Ayre 2004, The Right to Preserve. Coyle 2005, Descriptive metadata for copyright status. Rust 1998, Metadata: The Right Approach. DRM Watch at http://www.drmwatch.com/monitors digital rights management issues and news. Communications of the ACM, April 2003 contains seven DRM articles.

    Google Scholar 

  30. Marcum 2003, Keepers of the Crumbling Culture.

    Google Scholar 

  31. Sandhu 1998, Role-based Access Control. See also http://csrc.nist.gov/rbac/.

    Google Scholar 

  32. Data Capture Solutions 2005, ISO 15489—The Essentials, http://www.datacapture.co.uk/pdf/ISO-15489-White-Paper.pdf?=SID.

    Google Scholar 

  33. McKemmish 2004, Smart Metadata and the Archives of the Future, http://www.ifai.org.mx/ica/presentaciones/04.pdf.

    Google Scholar 

  34. Evans 2005, Create once, use many times. http://www.ifai.org.mx/ica/presentaciones/04.pdf.

    Google Scholar 

  35. National Archives 2004, http://www.nationalarchives.gov.uk/archives/framework/repositories.htm.

    Google Scholar 

  36. ICA 1999, ISAD(G): General International Standard Archival Description, http://www.ica.org/biblio/cds/isad_g_2e.pdf.

    Google Scholar 

  37. International Council on Archives 2005, Electronic Records: a Workbook for Archivists, http://www.ica.org/biblio/Study16ENG_5_2.pdf. National Archives of Australia 2004, Digital Recordkeeping Checklist, http://www.naa.gov.au/recordkeeping/er/checklist.html. Records Management Society 2005, Code of Practice for Records Managers and Archivists, http://www.rms-gb.org.uk/resources/140. Shepherd 2002, Managing Records.

    Google Scholar 

  38. Greenstein 2000, Minimum criteria for an archival repository of digital scholarly journals, http://www.diglib.org/preserve/criteria.htm.

    Google Scholar 

  39. Recordkeeping, http://www.naa.gov.au/recordkeeping/, and National Library of Australia Preservation Policy, http://www.nla.gov.au/policy/pres.html.

    Google Scholar 

  40. Jonas Palm 2006, The Digital Black Hole, http://www.tape-online.net/docs/Palm_Black_Hole.pdf.

    Google Scholar 

  41. Research Libraries Group 2002, Trusted digital repositories.

    Google Scholar 

  42. Casey 2006, Investigating Sophisticated Security Breaches.

    Google Scholar 

  43. Jantz 2005, Digital Preservation... Trusted Digital Repositories. Compare this to Chapter 11.

    Google Scholar 

  44. Ross 2005, Audit and Certification of Digital Repositories.

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

(2007). Archiving Practices. In: Preserving Digital Information. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-37887-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-37887-7_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-37886-0

  • Online ISBN: 978-3-540-37887-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics