PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Several techniques can be used to help mitigate these attacks such as 802.1x authentication to thwart unauthorized personal computers attempting to log into the network, using hard drive encryption software, and enforcing policies for password protected screen savers on a short timed duration.
http://www.w3.org/ns/prov#wasQuotedFrom
  • cisco.com