Skip to main content

Who Is Doing a Good Job? Audit and Certification

  • Chapter
  • First Online:
  • 2681 Accesses

Abstract

The Preserving Digital Information report of the Task Force on Archiving of Digital Information [243] declared,

  • a critical component of digital archiving infrastructure is the existence of a sufficient number of trusted organizations capable of storing, migrating, and providing access to digital collections.

  • process of certification for digital archives is needed to create an overall climate of trust about the prospects of preserving digital information .

Comradeship and trust will emerge naturally when discipline and high standards are enforced.

( Tao Zhu Gong )

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Digital Curation Centre (DCC), part funded by JISC. Web site http://www.dcc.ac.uk

  2. Repository Audit and Certification Working Group http://wiki.digitalrepositoryauditandcertification.org

  3. Davidson SB, Freire J (2008) Provenance and scientific workflows: challenges and opportunities. In: Procs of the 2008 ACM SIGMOD International Conference on Management of Data, pages 1345–1350. ACM.

    Google Scholar 

  4. Sunagawa E, Kozaki K, Kitamura Y, Mizoguchi R (2003) An Environment for Distributed Ontology Development Based on Dependency Management. In: Procs of the 2nd International Semantic Web Conference (ISWC’03), pages 453–468.

    Google Scholar 

  5. Fox MS, Huang J (2003) Knowledge provenance: An approach to modelling and maintaining the evolution and validity of knowledge. EIL Technical Report, University of Toronto. Available from http://www.eil.utoronto.ca/km/papers/fox-kp1.pdf

  6. Bobb N, Brandt SA, Hiatt A, Maltzahn C, Miller EL, Neeman A, Tuteja D (2005). Richer file system metadata using links and attributes. In: Procs of the 22nd IEEE/13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST’05), Monterey, California, April 2005.

    Google Scholar 

  7. Belguidoum M, Dagnat F (2007) Dependency Management in Software Component Deployment. In: Electronic Notes in Theoretical Computer Science, 182:17–32.

    Google Scholar 

  8. Franch X, Maiden NAM (2003) Modelling Component Dependencies to Inform their Selection. In :Procs of the 2nd International Conference on COTS-Based Software Systems, Springer.

    Google Scholar 

  9. Vieira M, Dias M, Richardson DJ (2001) Describing Dependencies in Component Access Points. In: Procs of the 23rd International Conference on Software Engineering (ICSE'01), Toronto, Canada, pages 115–118.

    Google Scholar 

  10. Vieira M, Richardson D (2002) Analyzing dependencies in large component-based systems. In: Procs of the 17th IEEE International Conference on Automated Service Engineering, ASE’02. Los Alamitos, CA, USA, 2002. IEEE Computer Society.

    Google Scholar 

  11. Walter M, Trinitis M, Karl W (2001) OpenSESAME: an intuitive dependability modelling environment supporting inter-component dependencies. In: Procs of Pacific Rim International Symposium on Dependable Computing, 76–83.

    Google Scholar 

  12. Tzitzikas Y, Flouris G (2007) Mind the (Intelligibily) Gap. In: Procs of the 11th European Conference on Research and Advanced Technology for Digital Libraries, (ECDL'07), Budapest, Hungary, September 2007. Springer-Verlag.

    Google Scholar 

  13. Kakas AC, Kowalski RA, Toni F (1998) The Role of Abduction in Logic Programming. In: Handbook of Logic in Artificial Intelligence and Logic Programming: Logic programming}, page 235

    Google Scholar 

  14. Console L , Dupre DT, Torasso P (1991). On the relationship between abduction and deduction. In: Journal of Logic and Computation. 1(5):661

    Google Scholar 

  15. Eiter T, Gottlob G (1995) The complexity of logic-based abduction. In: Journal of the ACM (JACM), 42(1):3–42.

    Google Scholar 

  16. Moreau L, Freire J, Myers J, Furelle J, Paulson P (2007) The Open Provenance Model, University of Southampton.

    Google Scholar 

  17. Theodoridou M, Tzitzikas Y, Doerr M, Marketakis Y, Melessanakis V (2010) Modelling and Querying Provenance by Extending CIDOC CRM . Journal of Distributed and Parallel Databases, 27:169–210.

    Google Scholar 

  18. Christiansen H, Dahl V (2004) Assumptions and abduction in Prolog . In: 3rd International Workshop on Multiparadigm Constraint Programming Languages, MultiCPL, Saint-Malo, France, September 2004

    Google Scholar 

  19. Digital Curation Centre (DCC), part funded by JISC. Web site http://www.dcc.ac.uk

  20. CCSDS (Consultative Committee for Space Data Systems ) web site http://www.ccsds.org

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David Giaretta .

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Giaretta, D. (2011). Who Is Doing a Good Job? Audit and Certification . In: Advanced Digital Preservation. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16809-3_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16809-3_25

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16808-6

  • Online ISBN: 978-3-642-16809-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics