Skip to Main Content
Protect
- Trustworthy Repositories Audit & Certification (TRAC): Criteria and Checklist, The Center for Research Libraries, March 2007. Read pages 1–8.
http://www.crl.edu/sites/default/files/attachments/pages/trac_0.pdf
- Authenticity and Provenance in Long Term Digital Preservation: Modeling and Implementation in Preservation Aware Storage. Michael Factor, et al., (undated, 2008 or later)
http://www.usenix.org/event/tapp09/tech/full_papers/factor/factor.pdf
- Role‐Based Access Control Models. Ravi S. Sadhu et al., IEEE Computer, Issue 2, Volume 29, 1995
http://csrc.nist.gov/rbac/sandhu96.pdf
- Authentication. Government Printing Office, 2010
http://www.gpo.gov/authentication
- Data Seal of Approval
http://www.datasealofapproval.org/
Examples: