http://www.w3.org/ns/prov#value | - ty practices and how did it evolve?3.1.7.a What specifically are the policy approaches?3.1.7.b What regulatory involvement was/is there?3.1.8 How were issues such as privacy, sensitive competitive information, etc. addressed (in particular in industry-wide security working groups)?
|