http://www.w3.org/ns/prov#value | - That is, defensive efforts are focused primarily on one perimeter???the perimeter that encompasses the entire system???with little defensive attention to components inside. (One familiar example of this is a firewall that protects all of the computers on a local area network???with the result that an attacker who compromises the firewall has rendered all of the computers on that network vulnerable
|