Electronic Records Management Guidelines
Electronic and Digital Signatures
Annotated List of Resources
Government Printing Office (GPO). Authenticity of Electronic Federal Government Publications. June 13, 2011.
This paper describes the tools and evidence that the GPO provides to users to help them verify that they can trust the source of the content, and that unauthorized alterations to content have not occurred. In doing such, the GPO provides evidence that the electronic information it maintains is from a trustworthy repository and the history of each item in the repository can be documented. The GPO also provides content integrity tools such as digitally signed PDF files and cryptographic hash values.
Minnesota Historical Society. Authentication. Center for Archival Resources on Legislatures (CAROL). March 2012.
This resource includes information on the Uniform Electronic Legal Materials Act (UELMA), as well as white papers and resources that introduce authentication, explore options, and associated cost models.
National Archives Records Administration (NARA). Records Management Guidance for PKI Digital Signature Authenticated and Secured Transaction Records. March 11, 2005.
Guidelines for the use of Public Key Infrastructure (PKI) digital signatures as authenticated and secure electronic transmissions.
National Archives Records Administration (NARA). Records Management Guidance for Agencies Implementing Electronic Signature Technologies. October 18, 2000.
Records management information for agencies concerned about ensuring the trustworthiness of their records. These guidelines address record management issues including trustworthiness, define key terms, and provide resources for further information and assistance.
National Institute of Standards and Technology (NIST), U.S. Department ofCOmmerce. Cryptographic Toolkit: Digital Signatures. Washington, D.C.: NIST, 2001.
NIST’s web site provides access to three Federal Information Processing Standards (FIPS) standards for digital signature algorithms, along with a variety of other resources on cryptography.
Artic Soft Technologies Limited. An Introduction to PKI (Public Key Infrastructure). 2010.
Introduces PKI, explains public and private keys used for digital signatures, certificates, storage methods for keys, certificate authorities, registration authorities, and certificate management techniques.
MBA Knowledge Base. How Public Key Infrastructure (PKI) Works? 2010.
Explains encryption, digital certificates, digital signatures, PKI, certificate authorities, and registration authorities.
Electronic Records Management Guidelines, March 2012, Version 5.
Links verified March 13, 2012.