> nestor-Handbuch:
> Eine kleine Enzyklopädie der digitalen Langzeitarchivierung
> Version 2.0 - Juni 2009
> Herausgegeben von: Heike Neuroth, Achim Oßwald, Regine Scheffel,
> Stefan Strathmann, Mathias Jehn
> http://nestor.sub.uni-goettingen.de/handbuch/
>
> Kap. 9.4 Persistent Identifier - Überblick, darin: 9:39-42 URN
> Kap. 9.4.1 Der Uniform Resource Name (URN)
>
>
> "Die NBN ist international gültig. Auf nationaler Ebene sind üblicherweise
> die Nationalbibliotheken für den Namensraum verantwortlich. In Deutsch-
> land hat die DNB die Koordinierungsfunktion übernommen. In den Jahren
> 2002 bis 2005 wurde im Rahmen des BMBF-Projekts „EPICUR –
> Enhancements of Persistent Identifier Services" eine Infrastruktur
> aufgebaut
> (http://www.persistent-identifier.de).31 Die DNB betreibt seither einen
> URN-Resolver für Deutschland, Österreich und die Schweiz. *** Beim
> Bibliotheksservice-Zentrum Baden-Württemberg (BSZ) existiert dazu ein
> Spiegelsystem, das bei Bedarf den Resolvingservice übernehmen kann.***"
>
>
> Sollins, Karen (1998): Architectural Principles of Uniform Resource Name
> Resolution,.http://www.ietf.org/rfc/rfc2276.txt
>
>
> ACCESS CONTROL ON HINTS: It must be possible to create an
> authoritative version of each hint with change control limited only
> to those principals with the right to modify it. The choice of who
> those principals are or whether they are unlimited must be made by
> the publisher of a hint.
>
> * SERVER AUTHENTICITY: Servers and clients must be able to learn the
> identity of the servers with which they communicate. This will be
> a matter of degree and it is possible that there will be more
> trustworthy, but less accessible servers, supported by a larger
> cluster of less authenticatable servers that are more widely
> available. In the worst case, if the client receives what appears
> to be unvalidated information, the client should assume that the
> hint may be inaccurate and confirmation of the data might be sought
> from more reliable but less accessible sources.
>
> * SERVER DISTRIBUTION: Broad availability will provide resistance to
> denial of service. It is only to the extent that the services are
> available that they provide any degree of trustworthiness. In
> addition, the distribution of services will reduce vulnerability of
> the whole community, by reducing the trust put in any single
> server. This must be mitigated by the fact that to the extent
> trust is based on a linked set of servers, if any one fails, the
> whole chain of trust fails; the more elements there are in such a
> chain, the more vulnerable it may become.
>
>
> (Hans-Werner Hilse and Jochen Kothe, Implementing Persistent Identifiers:
> Overview of concepts, guidelines and recommendations. London / Amsterdam:
> Consortium of European Libraries and European Commission on Preservation
> and Access, 2006, S. 18) http://www.knaw.nl/ecpa/publ/pdf/2732.pdf
> ISBN 90-6984-508-3.
>
via
>
> --
> http://www.inetbib.de
+
digest der openisi
1. Eric Carle - Ein K?nstler f?r Kinder (Karl Dietz)
2. Einf?hrung in die WLB am 02.12. (Karl Dietz)
3. Suchmaschine: Blinde Kuh (Karl Dietz)
4. Gesundheit / Medizin / ... (Karl Dietz)
5. Bundestag: Petition zu Open Access (Karl Dietz)
6. UB Regensburg. Repositorium. epicur ... (Karl Dietz)
7. ZKM - GAM - ... (Karl Dietz)
8. Das ABC der SLUB (Karl Dietz)
9. My Current Contents Linguistics . HeBIS (Karl Dietz)
10. DFG HBZ SWIB09 (Karl Dietz)
11. ZKBW-Dialog Nr. 62. DHM-datenbank (Karl Dietz)
--
MfG, Karl Dietz
http://www.karldietz.de
http://karldietz.blogspot.com