Using the SafeArchive system: TRAC-based auditing of LOCKSS

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The goals of SafeArchive are to make distributed replication easier, and to automate compliance with formal replication and storage policies. In this article, we describe the process of automated archival policy auditing in detail. First, we provide an overview of the SafeArchive system and we describe how a curator can use the tools to generate an archival policy schema and monitor it, simply. Second we identify specific TRAC criteria that can be verified automatically, and additional criteria that can be supported through integrated documentation. Third, we discuss the technical implementation of the system including the policy schema; how information used in the auditing process is obtained from a set of LOCKSS peers without modifying the LOCKSS trust model or configuration; and how the software is organized into components. ©2011 Society for Imaging Science and Technology.

Cite

CITATION STYLE

APA

Altman, M., & Crabtree, J. (2011). Using the SafeArchive system: TRAC-based auditing of LOCKSS. In Archiving 2011 - Preservation Strategies and Imaging Technologies for Cultural Heritage Institutions and Memory Organizations - Final Program and Proceedings (pp. 165–170). https://doi.org/10.2352/issn.2168-3204.2011.8.1.art00038

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free