ltans-1----Page:5
1  2  3  4  5 

Authorization
Authorization to access and/or manage archives is another problem
How to manage authentication/authorization information over a number of years?
Complicated by encryption
Protocol-related question, should encryption be manageable over time, i.e. adding additional “recipients”, changing keys, etc.?
Identification & Authentication for the Long-Term

PPT Version