Personal tools

Ace:Prototype Audit

From Adapt

Jump to: navigation, search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
AcePrototypeAudit web.gif
  1. The ACE-AM retrieves the integrity token associated with the digital object and computes the corresponding CSI value from the integrity token, followed by calling TSS_CompareCsi using the computed value and the timestamp parameters.
  2. The ACE-IMS retrieves the stored CSI that corresponds to the timestamp, and compares the stored CSI to the computed value.
  3. The comparison result is returned to the ACE-AM.
  4. If the comparison result is positive, the Audit Manger computes the hash of the object and compares it to the hash stored in the integrity token.