| http://www.w3.org/ns/prov#value | - Thus, a need remains for a security enforcement technique that allows for easier changing of the security to accommodate different environments (e.g., databases storing different types of information or items) as well as to be able to easily apply the security enforcement to different programs with reduced overall expense.
|