http://www.w3.org/ns/prov#value | - Where those protocols are signature-based, for example, a first such protocol can be used to implement security in zone that defines the ???business??? (or other enterprise-level) network and a second, separate signature-based protocol can be used in a zone in which workstations, controllers, field devices and other process control equipment communicate, e.g., with field devices and other process
|