PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Although there are techniques such as MAC spoofing that could enable someone to disguise their attacking device as a permitted computer, MAC filtering is generally a good policy if you or a few others are the only ones that will be using using the specified network.
http://www.w3.org/ns/prov#wasQuotedFrom
  • vivalageeks.com