Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Here is a workshop on PI?s.

[DCC Workshop on Persistent Identifiers
30 June ? 1 July 2005| http://www.dcc.ac.uk/training/pi-2005/Image Added]

Lots of excellent papers.

...

This distinction is made, and I think importantly, in this document:
http://www.cdlib.org/inside/diglib/ark/

3) The ERL reference talks about the trustworthiness of the reference.
Evidently their references include some sort of signature in the reference, which is then compared with the signature of the object. This proves that the user is pointed to what they planned to point to.

SYSTEMS

ARK

To quote: (http://www.cdlib.org/inside/diglib/ark/)
The Archival Resource Key (ARK) identifier is a naming scheme for persistent access to digital objects (including images, texts, data sets, and finding aids), currently being tested and implemented by the California Digital Library (CDL) for collections that it manages.
An identifier is an association between a string (a sequence of characters) and an information resource. That association is made manifest by a record (in the case of this service, a METS record ) that binds th[e identifier string to a set of identifying resource characteristics. The ARK identifier is a specially constructed, globally unique, actionable URL. Each ARK links end-users to three things:

...

Abstract. Much research on Internet security has concentrated so far
on generic mechanisms such as firewalls, IP authentication and protocols
for large scale key distribution. However, once we start to look at
specic specific applications, some quite dierent different requirements appear. We set
out to build an infrastructure that would support the reliable electronic
distribution of books on which doctors depend when making diagnostic
and treatment decisions, such as care protocols, drug formularies and
government notices. Similar requirements will be essential for other areas
of human activities such as electronic commerce.
We initially tried to implement a signature hierarchy based on X.509 but
found that this had a number of shortcomings. We therefore developed
an alternative way to manage trust in electronic publishing, that has a
number of advantages which may commend it in other applications. It
does not involve the use of export-controlled cryptography; it uses much
less computational resources than digital signature mechanisms; and it
provides a number of features that may be useful in environments where
we are worried about liability.
Yet another alternative involves use of one-time signatures. We have
actually implemented one-time signatures for one version of the medical
publishing system. This system initially used the familiar X.509 and
RSA based signature mechanisms; the move to one-time signatures enabled
considerable simplicationsimplifcation, cost reduction and performance improvement.
We believe that similar mechanisms may be appropriate for
protecting other information that changes slowly and remains available
over long time periods. Book and journal publishing or legal announcements
in general appear to be strong candidates.