{"title":"Enhancing security of ICA-AtoM: The web based archival description software","authors":"W. Karunarathne, S. P. Wimalarathne","doi":"10.1109/COMPSC.2014.7032654","DOIUrl":null,"url":null,"abstract":"Every Nation holds a unique history, which has already been written on stone inscriptions, paperbacks, journals, newspapers and some of them were herd though speeches and seen though portrayals other various artifacts. The days which was taken by the clock has gone for the embrace of the Nation's memory - which are Archives. Archives can be as many as millions of items, it is more than a record of government decisions. It is an archive about people from the ordinary to the famous, who together tell the story of the Nation. The Department of National Archives of Sri Lanka holds the memory of Sri Lanka as it has been identified as the last resort to find most of the valuable documents, papers or journals publish throughout the history. Besides of preservation of traditional and non-traditional government records basing on relevant stipulated rules and regulations, the National Archives facilities to retrieve information from its holdings for use by of the government for its administration processes and for research purposes to the public. The ICA-AtoM has played the role of connecting the public with Archives through a methodological data management and providing accessibility to records via Internet, which was not in its optimum of security when it's compared to a safe room. This paper aiming for highlight various security dodges in built to the ICA-AtoM, the Archival Description Software, discussing in detail the ICA-AtoM related vulnerabilities and how they are exploited and remedial techniques which can be effectively introduced to enhance the security.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 First International Conference on Computational Systems and Communications (ICCSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPSC.2014.7032654","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Every Nation holds a unique history, which has already been written on stone inscriptions, paperbacks, journals, newspapers and some of them were herd though speeches and seen though portrayals other various artifacts. The days which was taken by the clock has gone for the embrace of the Nation's memory - which are Archives. Archives can be as many as millions of items, it is more than a record of government decisions. It is an archive about people from the ordinary to the famous, who together tell the story of the Nation. The Department of National Archives of Sri Lanka holds the memory of Sri Lanka as it has been identified as the last resort to find most of the valuable documents, papers or journals publish throughout the history. Besides of preservation of traditional and non-traditional government records basing on relevant stipulated rules and regulations, the National Archives facilities to retrieve information from its holdings for use by of the government for its administration processes and for research purposes to the public. The ICA-AtoM has played the role of connecting the public with Archives through a methodological data management and providing accessibility to records via Internet, which was not in its optimum of security when it's compared to a safe room. This paper aiming for highlight various security dodges in built to the ICA-AtoM, the Archival Description Software, discussing in detail the ICA-AtoM related vulnerabilities and how they are exploited and remedial techniques which can be effectively introduced to enhance the security.