| http://www.w3.org/ns/prov#value | - The rules used by the VDS and IDS are easily formed and therefore an end user, such as a security or network engineer, can easily define and construct rules beyond any that are defined by the VDS/IDS provider (which may also use the rule structure).
|