| http://www.w3.org/ns/prov#value | - Accordingly, there is a need for a secure network system which will allow only authorized individuals to access classified data, but will not require the use of computer memory to perform authentication and auditing functions associated with the accessing of classified data.
|