| http://www.w3.org/ns/prov#value | - All of the foregoing distributed logging schemes, and other variants thereof that will be understood to those skilled in the art, can be used for authenticating the log entries with various degrees of protection for the log files' secrecy.
|