PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • For example, if an attacker is able to modify certain characteristics of an anonymised data stream coming through an anonymisation network such as Tor, the attacker can often discover the first Tor node connected to by the client, Murdoch said.
http://www.w3.org/ns/prov#wasQuotedFrom
  • techworld.com