Extending the Clark-Wilson Security Model for Digital Long-Term Preservation Use-cases

نویسندگان

  • Maik Schott
  • Christian Krätzer
  • Jana Dittmann
  • Claus Vielhauer
چکیده

A continuously growing amount of information of today exists not only in digital form but were actually born-digital. These informations need be preserved as they are part of our cultural and scientific heritage or because of legal requirements. As many of these information are born-digital they have no analog origin, and cannot be preserved by traditional means without losing their original representation. Thus digital long-term preservation becomes continuously important and is tackled by several international and national projects like the US National Digital Information Infrastructure and Preservation Program [1], the German NESTOR project [2] and the EU FP7 SHAMAN Integrated Project [3]. In digital long-term preservation the integrity and authenticity of the preserved information is of great importance and a challenging task considering the requirement to enforce both security aspects over a long time often assumed to be at least 100 years. Therefore in a previous work [4] we showed the general feasibility of the Clark-Wilson security model [5] for digital long-term preservation in combination with a syntactic and semantic verification approach [6] to tackle these issues. In this work we do a more detailed investigation and show exemplarily the influence of the application of such a security model on the use cases and roles of a digital long-term preservation environment. Our goals is a scalable security model – i.e. no fixed limitations of usable operations, users and objects – for mainly preserving integrity of objects but also ensuring authenticity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Security Contextualisation Framework for Digital Long-Term Preservation

Nowadays a growing amount of information not only exists in digital form but was actually born-digital. Digital long-term preservation becomes continuously important and is tackled by several international and national projects like the US National Digital Information Infrastructure and Preservation Program or the EU FP7 SHAMAN Integrated Project. The very essence of long-term preservation is t...

متن کامل

Integrity and Authenticity for Digital Long-term Preservation in Irods Grid Infrastructure

Digital resources and documents have become part of our culture as many cultural and intellectual goods are “born-digital” – existing only in digital form. Therefore digital long-term preservation is sustaining our cultural heritage for the future. Because of its importance digital preservation is addressed by several national and international projects like the German NESTOR project [12], the ...

متن کامل

Development of Quality Performance of National Digital Library with Kano's Model Approach

Background and Aim: The purpose of this study is to determine the quality requirements of the National Digital Library based on the Kano model and categorize users needs into three groups of:  Basic, functional and motivational. Methods: This survey was conducted with a qualitative approach. The requirements of the digital library were extracted using two standards: "Digiqual manual" and the "D...

متن کامل

Modeling the Domain of Digital Preservation in Wikidata

Members of the digital preservation community collate and capture metadata to describe file formats, software, operating systems and hardware, and use it to inform and drive digital preservation processes. In this work we describe how the infrastructure of Wikidata meets the requirements for a technical registry of metadata related to computer software and computing environments. Collaborativel...

متن کامل

The Speci cation and Implementation of ` Commercial ' Security RequirementsIncluding

A framework for the speciication of security policies is proposed. It can used to formally specify conndentiality and integrity policies, the latter can be given in terms of Clark-Wilson style access triples. The framework extends the Clark-Wilson model in that it can be used to specify dynamic segregation of duty. For application systems where security is critical, a mul-tilevel security based...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009