| http://www.w3.org/ns/prov#value | - We identified 18 technologies that are available within these categories, including smart tokens--which establish users' identities through an integrated circuit chip in a portable device such as a smart card or time- synchronized token--and security event correlation tools--which monitor and document actions on network devices and analyze the actions to determine if an attack is ongoing or has oc
|