http://www.w3.org/ns/prov#value | - The method herein described is particularly useful when a user attempts to sign-on at the local computer system by using an identifier (i.e. a user name) and a secret authenticator (i.e. a password) to identify himself or herself as one who is authorized to gain access to the local system.
|