PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Note that the authentication process shown in FIG. 8 is merely an example, and other known methods such as conventional random challenge & response and the like may be used as long as devices can authenticate each other to confirm if they are authentic devices, as described above.
http://www.w3.org/ns/prov#wasQuotedFrom
  • google.com