http://www.w3.org/ns/prov#value | - The method of claim 2, wherein the second device is a server located on an unsecure side of a second firewall and connectable through the second firewall to a third device located on a secure side of the second firewall, the method further comprising transmitting information between the second device and the third device using a virtual private network.
|