PropertyValue
?:about
?:abstract
  • 1: Evaluating and Selecting a Trustworthy Repository; 2: Resources, Policies and Management Structures; 3: Building a Trustworthy System: Ingest Process; 4: Creating and Capturing Metadata; 5: Capturing Audit Trail Data; 6: Assigning Retention and Disposal Data; 7: Creating an Access Strategy Theory; 8: Creating a Secure System; 9: Creating a Preservation Strategy; 10: Trustworthy Systems: Current Status and Future Directions (xsd:string)
?:contributor
?:dateModified
  • 2016 (xsd:gyear)
?:datePublished
  • 2016 (xsd:gyear)
?:duplicate
?:editor
?:hasFulltext
  • false (xsd:boolean)
is ?:hasPart of
?:inLanguage
  • Englisch (EN) (xsd:string)
?:isbn
  • 9781442263772 ()
?:libraryLocation
is ?:mainEntity of
?:name
  • Building trustworthy digital repositories : theory and implementation (xsd:string)
?:provider
?:publicationType
  • Buch (de)
  • Sammelwerk (xsd:string)
  • book (en)
?:publisher
?:sourceInfo
  • GESIS-BIB (xsd:string)
  • Lanham: Rowman & Littlefield, 2016.- XV, 371 S. (xsd:string)
rdf:type