Guarantee of authenticity, integrity and datedness is necessary to rely on digital data objects. In literature, there are several solutions which offer these guarantees in the long term, but not much is known about their performance. This work presents implementations for two promising solutions, namely Content Integrity System and Notarisation, and compares them in regard to their computational performance. The comparison reveals that Notarisation outperforms Content Integrity System in almost every aspect, but a verifier has to make higher trust assumptions in order to trust in the protection of a data object
Traditional methods for integrity checking in relational or deductive databases heavily rely on the ...
Abstract. Data integrity is an assurance that data has not been modified in an unknown or unauthoriz...
The objective of the paper was to reveal the main techniques and means of ensuring the integrity of ...
We present a “content integrity service” for long-lived digital documents, especially for objects st...
Digital archives rely on trusted parties, such as Certification Authorities, to ensure authenticity...
Prior Trustworthy 100-Year Digital Object articles describe a method for preserving digitally repres...
[EN] We argue that several kinds of desirable semantic properties of data provided by information sy...
The amount of information produced in the last decades has grown notably. Much of this information o...
How can a publisher store digital information so that any reader can reliably test its authenticity,...
With the increased need of data sharing among multiple organizations, such as government organizatio...
Current database survivability technologies focus on maintaining data integrity and availability in...
Data integrity is critical to the secure operation of a computer system. Applications need to know t...
Digital signatures are a powerful tool for demonstrating data integrity and performing source authen...
Digital storage demand is growing with the increasing use of digital artifacts from media files to b...
Trusted digital repositories manage the integrity and authenticity of records through multiple gener...
Traditional methods for integrity checking in relational or deductive databases heavily rely on the ...
Abstract. Data integrity is an assurance that data has not been modified in an unknown or unauthoriz...
The objective of the paper was to reveal the main techniques and means of ensuring the integrity of ...
We present a “content integrity service” for long-lived digital documents, especially for objects st...
Digital archives rely on trusted parties, such as Certification Authorities, to ensure authenticity...
Prior Trustworthy 100-Year Digital Object articles describe a method for preserving digitally repres...
[EN] We argue that several kinds of desirable semantic properties of data provided by information sy...
The amount of information produced in the last decades has grown notably. Much of this information o...
How can a publisher store digital information so that any reader can reliably test its authenticity,...
With the increased need of data sharing among multiple organizations, such as government organizatio...
Current database survivability technologies focus on maintaining data integrity and availability in...
Data integrity is critical to the secure operation of a computer system. Applications need to know t...
Digital signatures are a powerful tool for demonstrating data integrity and performing source authen...
Digital storage demand is growing with the increasing use of digital artifacts from media files to b...
Trusted digital repositories manage the integrity and authenticity of records through multiple gener...
Traditional methods for integrity checking in relational or deductive databases heavily rely on the ...
Abstract. Data integrity is an assurance that data has not been modified in an unknown or unauthoriz...
The objective of the paper was to reveal the main techniques and means of ensuring the integrity of ...