| http://www.w3.org/ns/prov#value | - Such special measures might include posting one or more security guards to visually monitor endpoints 10, or requiring authorized entities 12, 14 to enter an access code or other verification information to prevent an alarm from being sent to supervising entity 16 upon interaction with one of the endpoints 10.
|