| http://www.w3.org/ns/prov#value | - Existing system user oriented security is demonstrated by operating system commands such as the International Business Machines Corporation VM/ESA??? Operating System LOGON command and the Unix Systems Laboratories UNIX??? Operating System LOGIN command.
|