Authorization Authorization to access and/or manage archives is another problem How to manage authentication/authorization information over a number of years? Complicated by encryption Protocol-related question, should encryption be manageable over time, i.e. adding additional “recipients”, changing keys, etc.? Identification & Authentication for the Long-Term |