2017
DOI: 10.1002/spe.2515
|View full text |Cite
|
Sign up to set email alerts
|

Developing IntegrityCatalog, a software system for managing integrity‐related metadata in digital repositories

Abstract: SummaryDigital repositories must periodically check the integrity of stored objects to assure users of their correctness. Prior solutions calculate integrity metadata and require the repository to store it alongside the actual data objects. To safeguard and detect damage to this metadata, prior solutions rely on widely visible media (unaffiliated third parties) to store and provide back digests of the metadata to verify it is intact. However, they do not address recovery of the integrity metadata in case of da… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 44 publications
0
1
0
Order By: Relevance
“…However, the Kulla‐RIV solution distinguishes itself by encapsulating applications into VCs, offering improved response times during both deployment and execution. IntegrityCatalog 59 offers a solution for the management and IV of metadata content, capable of detecting inconsistencies and retrieving the original content of metadata. This proposal primarily focuses on managing IV for stored data.…”
Section: Related Workmentioning
confidence: 99%
“…However, the Kulla‐RIV solution distinguishes itself by encapsulating applications into VCs, offering improved response times during both deployment and execution. IntegrityCatalog 59 offers a solution for the management and IV of metadata content, capable of detecting inconsistencies and retrieving the original content of metadata. This proposal primarily focuses on managing IV for stored data.…”
Section: Related Workmentioning
confidence: 99%
“…SurfaceView enables the dynamic development of multitarget detection by using touch screens. This paper was organized in reference to Chondros et al [15] Part 2 begins with a system description of the POC system. This section presents the required requirements and design details of the system.…”
Section: Introductionmentioning
confidence: 99%