| http://www.w3.org/ns/prov#value | - Furthermore, most known data access systems and methods are not is suited to provide truly secure access to confidential information stored on private networks, such as corporate information located on a data store behind a security firewall.
|