Please wait a minute...
New Technology of Library and Information Service  2007, Vol. 2 Issue (6): 5-10    DOI: 10.11925/infotech.1003-3513.2007.06.02
article Current Issue | Archive | Adv Search |
Study on Certification Criteria for Trusted Digital Repository
Han Ke   Zhu Zhongming
(Lanzhou Branch of National Science Library, CAS, Lanzhou 730000, China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

The paper gives a brief background on certification of trusted digital repository. It introduces the concept of Trusted Digital Repository(TDR) and its attributes and resposibilities, which lay a basis for developing certification crietira for TDR. It looks into main components and certifiable elements of the certification criteria. At last,it briefly discusses the envisioned uses of the criteria.

Key wordsTrusted Digital Repository      Certification      Audit      Certification criteria     
Received: 04 April 2007      Published: 25 June 2007
: 

G250

 
Corresponding Authors: Han Ke     E-mail: kakahw@163.com
About author:: Han Ke,Zhu Zhongming

Cite this article:

Han Ke,Zhu Zhongming. Study on Certification Criteria for Trusted Digital Repository. New Technology of Library and Information Service, 2007, 2(6): 5-10.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2007.06.02     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2007/V2/I6/5

1Preserving Digital Information: A Report of the Task Force on Archiving of Digital Information.http://www.rlg.org/ArchTF/index.html(Accessed Feb.2, 2007)
2Trusted Digital Repositories: Attributes and Responsibilities.http://www.rlg.org/en/pdfs/repositories.pdf (Accessed Feb.2,2007)
3Criteria for Measuring Trustworthiness of Digital Repositories & Archives: an Audit & Certification Checklist.http://bibpurl.oclc.org/web/16713 (Accessed Feb.2, 2007)
4Attributes of a Trusted Digital Repository: Meeting the Needs of Research Resources.http://www.rlg.org/longterm/attributes01.pdf (Accessed Feb.2, 2007)

[1] Wei Chengfu,Wu Xu,Zhang Hua. Design and Realization of Web Application in Network Behavior Security Auditing System[J]. 现代图书情报技术, 2009, 3(2): 96-101.
[2] Li Sijing,Kang Yongxing. Process-Based Knowledge Map[J]. 现代图书情报技术, 2005, 21(1): 70-72.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn