http://www.w3.org/ns/prov#value | - Further, at least some embodiments of the invention have applicability in an environment where access is required to a file and/or device, but it is not known whether or not the file or device is encrypted (e.g., the state of the file and/or device is unknown).
|