| http://www.w3.org/ns/prov#value | - Cloud, mobile, social, and personal networks have types of identities, platforms, services, and technologies not traditionally addressed by enterprise IAM. The result is fractured user authentication and authorization across applications and resources.
|