Future work
There are many areas in this design that present the opportunity for further research. Our own priorities would include rearranging the database structures to implement the principle of division into subsystems so that the assurance subsystems are reflected in the arrangement of data within the tables. On network security the use of ftp, only used as a protocol for ease when building a prototype, should be replaced with, for example, SSH and use digital certificates as authentication. Issues of Governance and Chain of Custody need to be assessed including comparisons with standards like ISO 27037 and OAIS. The design was always intended to allow existing, legacy, software to run without alteration. We need to consider how we can achieve data abstraction above the middleware.
Acknowledgements
This work is part-funded by the European Social Fund (ESF) through the European Union’s Convergence programmed administered by the Welsh Government.
Future workThere are many areas in this design that present the opportunity for further research. Our own priorities would include rearranging the database structures to implement the principle of division into subsystems so that the assurance subsystems are reflected in the arrangement of data within the tables. On network security the use of ftp, only used as a protocol for ease when building a prototype, should be replaced with, for example, SSH and use digital certificates as authentication. Issues of Governance and Chain of Custody need to be assessed including comparisons with standards like ISO 27037 and OAIS. The design was always intended to allow existing, legacy, software to run without alteration. We need to consider how we can achieve data abstraction above the middleware.AcknowledgementsThis work is part-funded by the European Social Fund (ESF) through the European Union’s Convergence programmed administered by the Welsh Government.
การแปล กรุณารอสักครู่..
