Personal tools

Ace:Prototype Audit

From Adapt

Jump to: navigation, search
AcePrototypeAudit web.gif
  1. The ACE-AM retrieves the integrity token associated with the digital object and computes the corresponding CSI value from the integrity token, followed by calling TSS_CompareCsi using the computed value and the timestamp parameters.
  2. The ACE-IMS retrieves the stored CSI that corresponds to the timestamp, and compares the stored CSI to the computed value.
  3. The comparison result is returned to the ACE-AM.
  4. If the comparison result is positive, the Audit Manger computes the hash of the object and compares it to the hash stored in the integrity token.