| http://www.w3.org/ns/prov#value | - The methods and processes include Pool Boundary Protocol definitions, Meta-data Query Definitions, and Pool Content Access definitions. [0073] The Pool Boundary Protocols enable utility including security authentication, availability and access management, data exchange, data and data set integrity assessment.
|