| http://www.w3.org/ns/prov#value | - That approach gave businesses the ability to require additional authentication when a user wanted to read/send and email or access a shared calendar as well as to encrypt any associated data.Good and other companies have expanded this approach to creating on-device containers for all kinds of data including files and documents.
|