| http://www.w3.org/ns/prov#value | - That is, assuming individual persons are first identified to the system in a satisfactory manner, their access to documents, programs, facilities, and other objects" within the protected computer system is then controlled by a security system simply by comparing the user's name against a list of names of persons entitled to access the given object.
|