PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • In addition, IT should use policies to enforce security zone compliance, orchestrate host and hypervisor based firewalls, AV, HIDS, virtual networking, data encryption, and other security tools and utilities.
http://www.w3.org/ns/prov#wasQuotedFrom
  • sys-con.com