Proceedings of the 11th Annual International ACM/IEEE Joint Conference on Digital Libraries 2011
DOI: 10.1145/1998076.1998088
|View full text |Cite
|
Sign up to set email alerts
|

Extending digital repository architectures to support disk image preservation and access

Abstract: Disk images (bitstreams extracted from physical media) can play an essential role in the acquisition and management of digital collections by serving as containers that support data integrity and chain of custody, while ensuring continued access to the underlying bits without depending on physical carriers. Widely used today by practitioners of digital forensics, disk images can serve as baselines for comparison for digital preservation activities, as they provide fail-safe mechanisms when curatorial actions m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 18 publications
0
10
0
Order By: Relevance
“…Overall, standards for acquiring, processing, and describing born‐digital materials have been relatively slow to develop, resulting in a high backlog of legacy media at collecting institutions. Processing legacy materials on different carriers can be challenging, due to a variety of technical factors, including: format obsolescence (Singh, ), hardware and/or software component failure (Rosenthal, Robertson, Lipkis, Reich, & Morabito, ), or the risk of alteration to original materials (Woods, Lee, & Garfinkel, ). Legacy media can also present challenges to traditional modes of archival processing, in which parallel arrangement and description of materials is encouraged to ensure archival integrity and provenance.…”
Section: An Ecosystem Approach To Modeling Software Curationmentioning
confidence: 99%
“…Overall, standards for acquiring, processing, and describing born‐digital materials have been relatively slow to develop, resulting in a high backlog of legacy media at collecting institutions. Processing legacy materials on different carriers can be challenging, due to a variety of technical factors, including: format obsolescence (Singh, ), hardware and/or software component failure (Rosenthal, Robertson, Lipkis, Reich, & Morabito, ), or the risk of alteration to original materials (Woods, Lee, & Garfinkel, ). Legacy media can also present challenges to traditional modes of archival processing, in which parallel arrangement and description of materials is encouraged to ensure archival integrity and provenance.…”
Section: An Ecosystem Approach To Modeling Software Curationmentioning
confidence: 99%
“…Compromised disk image is a security problem that affects the VMI which is caused by tampering with data [27] or information disclosure [28].…”
Section: Threats Classificationmentioning
confidence: 99%
“…The limitations of working with such a small sample have been referenced several times in this article and these have been recognized by both the project team and project board. As a result, the second phase of Flashback is using a much larger sample and is considering objectives, which were not able to be fully addressed by the proof of concept, in particular, the treatment of disk images as objects within collections (Woods et al, 2011) and the deployment of solutions at scale. Flashback phase 2, which should be complete by the end of 2016, has three main strands.…”
Section: Conclusion and Subsequent Activitiesmentioning
confidence: 99%