Macneil, 2000 - Google Patents
Creating and maintaining trustworthy records in electronic systems: archival diplomatic methodsMacneil, 2000
- Document ID
- 4051793241484884763
- Author
- Macneil H
- Publication year
- Publication venue
- Trusting Records: Legal, Historical and Diplomatic Perspectives
External Links
Snippet
Diplomatics was born in the seventeenth century as an analytical technique for determining the authenticity of records issued by sovereign authorities in previous centuries. Its primary purpose was to ascertain" the reality of the rights or truthfulness of the facts'" contained in …
- 238000004458 analytical method 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
- G06F17/2288—Version control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/24—Editing, e.g. insert/delete
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Duranti et al. | The protection of the integrity of electronic records: an overview of the UBC-MAS research project | |
Tavani | Ethics and technology: Controversies, questions, and strategies for ethical computing | |
Duranti et al. | Preservation of the integrity of electronic records | |
Mitchell et al. | dAppER: decentralised application for examination review | |
Duranti | From digital diplomatics to digital records forensics | |
MacNeil | Providing grounds for trust: developing conceptual requirements for the long-term preservation of authentic electronic records | |
Bearman | Moments of risk: identifying threats to electronic records | |
McCartney | Forensic data exchange: ensuring integrity | |
Doorn et al. | Lies, damned lies and research data: can data sharing prevent data fraud? | |
Rogers | A literature review of authenticity of records in digital systems: from ‘machine-readable’to records in the cloud | |
Tough et al. | Record keeping in a hybrid environment: managing the creation, use, preservation and disposal of unpublished information objects in context | |
Randell | A computer scientist's reactions to NPfIT | |
Trace et al. | Algorithmic futures: The intersection of algorithms and evidentiary work | |
Ng et al. | Electronic laboratory notebook on web2py framework | |
Macneil | Creating and maintaining trustworthy records in electronic systems: archival diplomatic methods | |
Duranti | The long-term preservation of authentic electronic records | |
Brissett et al. | Machine learning and watermarking for accurate detection of AI generated phishing emails. | |
Shepherd et al. | The role of records managers and archivists in open government | |
Krahn | Looking under the hood: unraveling the content, structure, and context of functional requirements for electronic recordkeeping systems | |
Gilliland-Swetland | Testing our truths: Delineating the parameters of the authentic archival electronic record | |
Stilinović | Testamentary Dispositions in the Context of Global Pandemic | |
Babalola et al. | Land administration systems and legal framework reform focussing on constitutional principles in Sub-Saharan Africa | |
Rosenberg | Returning to Plato's Cave: Metadata's Shadows in the Courtroom | |
Landon et al. | Technical issues in systems for WWW-based course support | |
Molaee | AI Embassies: A New Frontier in Cyber Domain |