http://www.w3.org/ns/prov#value | - In today's distributed computing environments -- mobile, desktop, server or embedded -- software, is exposed to attacks such as reverse-engineering, tampering, insertion of malware/exploits, repackaging, fraud, intellectual property theft, and piracy.
|