Advanced digital preservation

Titel: Advanced digital preservation / David Giaretta
Verfasser:
Veröffentlicht: Berlin : Springer, 2011
Umfang: XXII, 510 Seiten : Illustrationen, Diagramme ; 25 cm
Format: Buch
Sprache: Englisch
RVK-Notation:
Schlagworte:
ISBN: 9783642168086 ; 3642168086
  • 1
  • Introduction
  • p. 1
  • 1.1
  • What's So Special About Digital Things?
  • p. 2
  • 1.2
  • Terminology
  • p. 5
  • 1.3
  • Summary
  • p. 5
  • 2
  • The Really Foolproof Solution for Digital Preservation
  • p. 7
  • Part I
  • Theory - The Concepts and Techniques Which Are Essential for Preserving Digitally Encoded Information
  • 3
  • Introduction to OAIS Concepts and Terminology
  • p. 13
  • 3.1
  • Preserve What, for How Long and for Whom?
  • p. 13
  • 3.2
  • What "Metadata", How Much "Metadata"?
  • p. 16
  • 3.3
  • Recursion - A Pervasive Concept
  • p. 26
  • 3.4
  • Disincentives Against Digital Preservation
  • p. 28
  • 3.5
  • Summary
  • p. 30
  • 4
  • Types of Digital Objects
  • p. 31
  • 4.1
  • Simple vs. Composite
  • p. 31
  • 4.2
  • Rendered vs. Non-rendered
  • p. 33
  • 4.3
  • Static vs. Dynamic
  • p. 38
  • 4.4
  • Active vs. Passive
  • p. 38
  • 4.5
  • Multiple-Classifications
  • p. 39
  • 4.6
  • Summary
  • p. 39
  • 5
  • Threats to Digital Preservation and Possible Solutions
  • p. 41
  • 5.1
  • What Can Be Relied on in the Long-Term?
  • p. 43
  • 5.2
  • What Others Think About Major Threats to Digital Preservation
  • p. 44
  • 5.3
  • Summary
  • p. 45
  • 6
  • OAIS in More Depth
  • p. 47
  • 6.1
  • OAIS Conformance
  • p. 49
  • 6.2
  • OAIS Mandatory Responsibilities
  • p. 50
  • 6.3
  • OAIS Information Model
  • p. 53
  • 6.4
  • OAIS Functional Model
  • p. 63
  • 6.5
  • Information Flows and Layering
  • p. 65
  • 6.6
  • Issues Not Covered in Detail by OAIS
  • p. 65
  • 6.7
  • Summary
  • p. 67
  • 7
  • Understanding a Digital Object: Basic Representation Information
  • p. 69
  • Co-author Stephen Rankin
  • 7.1
  • Levels of Application of Representation Information Concept
  • p. 69
  • 7.2
  • Overview of Techniques for Describing Digital Objects
  • p. 71
  • 7.3
  • Structure Representation Information
  • p. 75
  • 7.4
  • Format Identification
  • p. 96
  • 7.5
  • Semantic Representation Information
  • p. 97
  • 7.6
  • Other Representation Information
  • p. 101
  • 7.7
  • Application to Types of Digital Objects
  • p. 102
  • 7.8
  • Virtualisation
  • p. 112
  • 7.9
  • Emulation
  • p. 123
  • 7.10
  • Summary
  • p. 137
  • 8
  • Preservation of Intelligibility of Digital Objects
  • p. 139
  • Co-authors Yannis Tzitzikas, Yannis Marketakis, and Vassilis Christophides
  • 8.1
  • On Digital Objects and Dependencies
  • p. 139
  • 8.2
  • A Formal Model for the Intelligibility of Digital Objects
  • p. 142
  • 8.3
  • Modelling and Implementation Frameworks
  • p. 163
  • 8.4
  • Summary
  • p. 166
  • 9
  • Understandability and Usability of Data
  • p. 167
  • 9.1
  • Re-Use of Digital Objects - Interoperability and Preservation
  • p. 168
  • 9.2
  • Use of Existing Software
  • p. 171
  • 9.3
  • Creation of New Software
  • p. 173
  • 9.4
  • Without Software
  • p. 173
  • 9.5
  • Software as the Digital Object Being Preserved
  • p. 174
  • 9.6
  • Digital Archaeology, Digital Forensics and Re-Use
  • p. 174
  • 9.7
  • Multiple Objects
  • p. 175
  • 9.8
  • Summary
  • p. 175
  • 10
  • In Addition to Understanding It - What Is It?: Preservation Description Information
  • p. 177
  • 10.1
  • Introduction
  • p. 177
  • 10.2
  • Fixity Information
  • p. 177
  • 10.3
  • Reference Information
  • p. 178
  • 10.4
  • Context Information
  • p. 184
  • l0.5
  • Provenance Information
  • p. 184
  • 10.6
  • Access Rights Management
  • p. 185
  • 10.7
  • Summary
  • p. 190
  • 11
  • Linking Data and "Metadata": Packaging
  • p. 191
  • 11.1
  • Information Packaging Overview
  • p. 191
  • 11.2
  • Archival Information Packaging
  • p. 192
  • 11.3
  • XFDU
  • p. 193
  • 11.4
  • Summary
  • p. 196
  • 12
  • Basic Preservation Strategies
  • p. 197
  • 12.1
  • Description - Adding Representation Information
  • p. 198
  • 12.2
  • Maintaining Access
  • p. 198
  • 12.3
  • Migration/Transformation
  • p. 200
  • 12.4
  • Summary
  • p. 202
  • 13
  • Authenticity
  • p. 203
  • 13.1
  • Background to Authenticity
  • p. 204
  • 13.2
  • OAIS Definition of Authenticity
  • p. 205
  • 13.3
  • Elements of the Authenticity Conceptual Model
  • p. 208
  • 13.4
  • Overall Authenticity Model
  • p. 212
  • 13.5
  • Authenticity Evidence
  • p. 214
  • 13.6
  • Significant Properties
  • p. 214
  • 13.7
  • Prototype Authenticity Evidence Capture Tool
  • p. 221
  • 13.8
  • Summary
  • p. 232
  • 14
  • Advanced Preservation Analysis
  • p. 233
  • Co-author Esther Conway
  • 14.1
  • Preliminary Investigation of Data Holdings
  • p. 234
  • 14.2
  • Stakeholder and Archive Analysis
  • p. 235
  • 14.3
  • Defining a Preservation Objective
  • p. 237
  • 14.4
  • Defining a Designated User Community
  • p. 238
  • 14.5
  • Preservation Information Flows
  • p. 240
  • 14.6
  • Preservation Strategy Topics
  • p. 243
  • 14.7
  • Preservation Plans
  • p. 245
  • 14.8
  • Cost/Benefit/Risk Analysis
  • p. 245
  • 14.9
  • Preservation Analysis Summary
  • p. 246
  • 14.10
  • Preservation Analysis and Representation Information in More Detail
  • p. 246
  • 14.11
  • Network Modelling Approach
  • p. 247
  • 14.12
  • Summary
  • p. 264
  • Part II
  • Practice - Use and Validation of the Tools and Techniques that Can Be Used for Preserving Digitally Encoded Information
  • 15
  • Testing Claims About Digital Preservation
  • p. 267
  • 15.1
  • "Accelerated Lifetime" Testing of Digital Preservation Techniques
  • p. 267
  • 15.2
  • Summary
  • p. 269
  • 16
  • Tools for Countering the Threats to Digital Preservation
  • p. 271
  • 16.1
  • Key Preservation Components and Infrastructure
  • p. 272
  • 16.2
  • Discipline Independent Aspects
  • p. 276
  • 16.3
  • Discipline Dependence: Toolboxes/Libraries
  • p. 284
  • 16.4
  • Key Infrastructure Components
  • p. 284
  • 16.5
  • Information Package Management
  • p. 285
  • 16.6
  • Information Access
  • p. 287
  • 16.7
  • Designated Community, Knowledge and Provenance Management
  • p. 287
  • 16.8
  • Communication Management
  • p. 288
  • 16.9
  • Security Management
  • p. 289
  • 17
  • The CASPAR Key Components Implementation
  • p. 291
  • 17.1
  • Design Considerations
  • p. 291
  • 17.2
  • Registry/Repository of Representation Information Details
  • p. 291
  • 17.3
  • Virtualizer
  • p. 297
  • 17.4
  • Knowledge Gap Manager
  • p. 301
  • 17.5
  • Preservation Orchestration Manager
  • p. 303
  • 17.6
  • Preservation DataStores
  • p. 305
  • 17.7
  • Data Access and Security
  • p. 315
  • 17.8
  • Digital Rights Management Details
  • p. 318
  • 17.9
  • Find-Finding Manager
  • p. 321
  • 17.10
  • Information Packaging Details
  • p. 322
  • 17.11
  • Authenticity Manager Toolkit
  • p. 332
  • 17.12
  • Representation Information Toolkit
  • p. 333
  • 17.13
  • Key Components - Summary
  • p. 335
  • 17.14
  • Integrated tools
  • p. 337
  • 18
  • Overview of the Testbeds
  • p. 341
  • 18.1
  • Typical Preservation Scenarios
  • p. 341
  • 18.2
  • Generic Criteria and Method to Organise and to Evaluate the Testbeds
  • p. 342
  • 18.3
  • Cross References Between Scenarios and Changes
  • p. 343
  • 19
  • ISTFC Science Testbed
  • p. 345
  • 19.1
  • Dataset Selection
  • p. 345
  • 19.2
  • Challenges Addressed
  • p. 345
  • 19.3
  • Preservation Aims
  • p. 347
  • 19.4
  • Preservation Analysis
  • p. 347
  • 19.5
  • MST RADAR Scenarios
  • p. 347
  • 19.6
  • Ionosonde Data and the WDC Scenarios
  • p. 361
  • 19.7
  • Summary of Testbed Checks
  • p. 366
  • 20
  • European Space Agency Testbed
  • p. 367
  • 20.1
  • Dataset Selection
  • p. 369
  • 20.2
  • Challenge Addressed
  • p. 370
  • 20.3
  • Preservation Aim
  • p. 372
  • 20.4
  • Preservation Analysis
  • p. 372
  • 20.5
  • Scenario ESA1 - Operating System Change
  • p. 372
  • 20.6
  • Additional Workflow Scenarios
  • p. 384
  • 20.7
  • Conclusions
  • p. 386
  • 21
  • Cultural Heritage Testbed
  • p. 387
  • 21.1
  • Dataset Selection
  • p. 388
  • 21.2
  • Challenges Addressed
  • p. 396
  • 21.3
  • Preservation Aim
  • p. 396
  • 21.4
  • Preservation Analysis
  • p. 396
  • 21.5
  • Scenario UNESCO 1: Villa LIVIA
  • p. 397
  • 21.6
  • Related Documentation
  • p. 406
  • 21.7
  • Other Misc Data with a Brief Description
  • p. 406
  • 21.8
  • Glossary
  • p. 406
  • 22
  • Contemporary Performing Arts Testbed
  • p. 407
  • 22.1
  • Historical Introduction to the Issue
  • p. 407
  • 22.2
  • An Insight into Objects
  • p. 409
  • 22.3
  • Challenges of Preservation
  • p. 411
  • 22.4
  • Preserving the Real-Time Processes
  • p. 412
  • 22.5
  • Interactive Multimedia Performance
  • p. 419
  • 22.6
  • CIANTTestbed
  • p. 426
  • 22.7
  • Summary
  • p. 428
  • Part III
  • Is Money Well Spent? Cutting the Cost and Making Sure Money Is Not Wasted
  • 23
  • Sharing the Effort
  • p. 431
  • 23.1
  • Chain of Preservation
  • p. 431
  • 23.2
  • Mechanisms for Sharing the Burden of Preservation
  • p. 431
  • 24
  • Infrastructure Roadmap
  • p. 435
  • 24.1
  • Requirements for a Science Data Infrastructure
  • p. 435
  • 24.2
  • Possible Financial Infrastructure Concepts and Components
  • p. 436
  • 24.3
  • Possible Organisational and Social Infrastructure Concepts and Components
  • p. 437
  • 24.4
  • Possible Policy Infrastructure Concepts and Components
  • p. 446
  • 24.5
  • Virtualisation of Policies, Resources and Processes
  • p. 448
  • 24.6
  • Technical Science Data Concepts and Components
  • p. 449
  • 24.7
  • Aspects Excluded from This Roadmap
  • p. 456
  • 24.8
  • Relationship to Other Infrastructures
  • p. 457
  • 24.9
  • Summary
  • p. 459
  • 25
  • Who Is Doing a Good Job? Audit and Certification
  • p. 461
  • 25.1
  • Background
  • p. 461
  • 25.2
  • TRAC and Related Documents
  • p. 463
  • 25.3
  • Development of an ISO Accreditation and Certification Process
  • p. 464
  • 25.4
  • Understanding the ISO Trusted Digital Repository Metrics
  • p. 465
  • 25.5
  • Summary
  • p. 480
  • 26
  • Final Thoughts
  • p. 481
  • References
  • p. 483
  • Contributors
  • p. 495
  • Index
  • p. 505