Return to Article Details Chapter 4. Accessioning and Stabilization Workflow