http://www.w3.org/ns/prov#value | - Once the desirable security parameters are thus selected/predetermined, other users with rights to create or modify operations need only concern themselves with whether a particular job or resource, or a superset of such, are to include authentication or encryption.
|