| http://www.w3.org/ns/prov#value | - The following is a description of an exemplary mathematical function that can be used to generate the contents of security segment 204, however, otherfunctions known in the art could also be used.According to one embodiment, a hash function such as a keyed hash message authentication code (HMAC) is used to produce a security code, and the security code is then used to determine the contents of sec
|