| http://www.w3.org/ns/prov#value | - For example, for a security system of given configuration, i.e. a set of cards and associated software installed in the cards 2 and the verification units 3 in order to perform particular functions, the same card can be used for different applications, for example authentication vis-???-vis a data processing or similar network to obtain access to one or more resources of that network (access to ea
|