http://www.w3.org/ns/prov#value | - FIG. 3 is a flow chart illustrating an example method for managing communication traffic in a network, such as enterprise network 210, using a proxy enforcer, such as proxy enforcer 250. 0First, in step 302, proxy enforcer 250 can be configured to passively listen to the messages comprising the communication traffic.
|