A continuously growing amount of information of today exists not only in digital form but were actually born-digital. These informations need be preserved as they are part of our cultural and scientific heritage or because of legal requirements. As many of these information are born-digital they have no analog origin, and cannot be preserved by traditional means without losing their original representation. Thus digital long-term preservation becomes continuously important and is tackled by several international and national projects like the US National Digital Information Infrastructure and Preservation Program [1], the German NESTOR project [2] and the EU FP7 SHAMAN Integrated Project [3]. In digital long-term preservation the integrity and authenticity of the preserved information is of great importance and a challenging task considering the requirement to enforce both security aspects over a long time often assumed to be at least 100 years. Therefore in a previous work [4] we showed the general feasibility of the Clark-Wilson security model [5] for digital long-term preservation in combination with a syntactic and semantic verification approach [6] to tackle these issues. In this work we do a more detailed investigation and show exemplarily the influence of the application of such a security model on the use cases and roles of a digital long-term preservation environment. Our goals is a scalable security model - i.e. no fixed limitations of usable operations, users and objects - for mainly preserving integrity of objects but also ensuring authenticity.
[1]
Maik Schotta,et al.
INTEGRITY AND AUTHENTICITY FOR DIGITAL LONG-TERM PRESERVATION IN IRODS GRID INFRASTRUCTURE
,
2008
.
[2]
David D. Clark,et al.
A Comparison of Commercial and Military Computer Security Policies
,
1987,
1987 IEEE Symposium on Security and Privacy.
[3]
Paul B. Watry.
Digital Preservation Theory and Application: Transcontinental Persistent Archives Testbed Activity
,
2007,
Int. J. Digit. Curation.
[4]
K. J. Bma.
Integrity considerations for secure computer systems
,
1977
.
[5]
Kenneth Thibodeau,et al.
Overview of Technological Approaches to Digital Preservation and Challenges in Coming Years
,
2005
.