http://www.w3.org/ns/prov#value | - Similarly, the process of revoking access to confidential data and systems is equally convoluted and time consuming, posing a significant security risk as well as a financial burden when, for example, cell phones, pagers or other devices are left active.
|