| http://www.w3.org/ns/prov#value | - A logging process 140 may use encryption, checksums, digital signatures and other techniques to protect the content of the log 161 from being accessed or tampered by other processes or hackers attempting to circumvent unauthorized signal usage detection and prevention.
|