PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • FIG. 3 is a flow chart illustrating an example method for managing communication traffic in a network, such as enterprise network 210, using a proxy enforcer, such as proxy enforcer 250. 0First, in step 302, proxy enforcer 250 can be configured to passively listen to the messages comprising the communication traffic.
http://www.w3.org/ns/prov#wasQuotedFrom
  • google.com