http://www.w3.org/ns/prov#value | - Ensuring that a particular entity, such as a user, software application, network node or other entity, is a proper entity that has proper authorization to use the information security system, has become an important consideration in designing information security systems.
|