PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Programs like unauthorized IM, peer-to-peer file sharing and web conferencing can use highly evasive techniques to circumvent existing security infrastructures such as firewalls.
http://www.w3.org/ns/prov#wasQuotedFrom
  • tmcnet.com