Registro 1 de 2, Base de información BIBCYT
Información de existencia
Resumen
The article focuses on authorization management for digital library. University information services need unobtrusive but effective means of providing different members different levels of service. Safe Dealing (SD) is an authorization mechanism motivated by information delivery that has many other potential applications among popular services. SD's extreme target is the circumstance in which some user requests a valuable Internet service of a server. This server should grant the request only if the requester is appropriately authorized. Furthermore, the requester will want to avoid sharing personal information beyond what is reasonable for the transaction at hand. In fact, SD can deny digital servers any information about any user except the Internet Protocol address to which they should deliver results and can still reliably limit delivery as specified by service proprietors' policies. SD must enable somebody to trace any suspect transaction back to its human originator. SD limits this to transaction clearance centers made trustworthy by business controls and audits not practically or economically exercised in large numbers of individual servers.
Registro 2 de 2, Base de información BIBCYT
Información de existencia
Resumen
The article presents information on a system design that addresses all
technical issues for reliable digital preservation of substantial collections
The article presents information on
a system design that addresses all technical issues for reliable digital
preservation of substantial collections. A compete solution to the problem of
digital preservation would ensure the atleast a copy of preserved record
survives, and authorized consumers can find and use any preserved record as its
producers intend. Viable solutions will allow repositories and their clients to
use deployed content management software without disruption. Preservation can
be viewed as a special case of information interchange. Perfect digital copying
contributes both to the challenge of preserving digital solution and to its
solution. The new code needed for digital preservation is likely to be mostly
workstation software so the people focusing repositories will find it difficult
to design solutions. The Trustworthy Digital Object focuses on methods for
making the authenticity of preserved digital objects reliably testable and for
assuring that eventual users will be able to render or otherwise use their
contents.