Personal tools

Ace:Prototype Audit

From Adapt

Revision as of 14:33, 11 September 2008 by Toaster (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
AcePrototypeAudit web.gif
  1. The ACE-AM retrieves the integrity token associated with the digital object and computes the corresponding CSI value from the integrity token, followed by calling TSS_CompareCsi using the computed value and the timestamp parameters.
  2. The ACE-IMS retrieves the stored CSI that corresponds to the timestamp, and compares the stored CSI to the computed value.
  3. The comparison result is returned to the ACE-AM.
  4. If the comparison result is positive, the Audit Manger computes the hash of the object and compares it to the hash stored in the integrity token.