Personal tools

Ace:Prototype Audit: Difference between revisions

From Adapt

Jump to: navigation, search
No edit summary
(No difference)

Revision as of 14:32, 11 September 2008

   <img src="%ATTACHURLPATH%/Audit_web.gif" alt="Audit_web.gif"  width="385" height="266"  />
  1. The ACE-AM retrieves the integrity token associated with the digital object and computes the corresponding CSI value from the integrity token, followed by calling TSS_CompareCsi using the computed value and the timestamp parameters.
  2. The ACE-IMS retrieves the stored CSI that corresponds to the timestamp, and compares the stored CSI to the computed value.
  3. The comparison result is returned to the ACE-AM.
  4. If the comparison result is positive, the Audit Manger computes the hash of the object and compares it to the hash stored in the integrity token.