PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • But if IT security managers want to place controls on the user device to separate out and manage corporate e-mail, applications and data, it is possible to enforce security such as authentication, encryption, data leakage, cut-and-paste restrictions and selective content wiping through various types of container technologies.
http://www.w3.org/ns/prov#wasQuotedFrom
  • techworld.com