| http://www.w3.org/ns/prov#value | - Developers in particular are likely to know them.This should make it easier for people with little or no security background to start thinking about securing their systems and how to trade-off security and functionality.However, it seems that threat modeling gives the same advantages as abuse cases.
|