Matches in LOV for { ?s <http://www.w3.org/2000/01/rdf-schema#comment> ?o. }
- participant comment "Other co-agents that participated in the action indirectly. e.g. John wrote a book with *Steve*.".
- performer comment "A performer at the event—for example, a presenter, musician, musical group or actor.".
- photo comment "A photograph of this place.".
- position comment "The position of the creative work within a series or other ordered collection of works.".
- producer comment "The producer of the movie, tv/radio series, season, or episode, or video.".
- productID comment "The product identifier, such as ISBN. For example: <code><meta itemprop='productID' content='isbn:123-456-789'/></code>.".
- provider comment "The service provider, service operator, or service performer; the goods producer. Another party (a seller) may offer those services or goods on behalf of the provider. A provider may also serve as the seller.".
- publisher comment "The publisher of the creative work.".
- relatedTo comment "The most generic familial relation.".
- result comment "The result produced in the action. e.g. John wrote *a book*.".
- review comment "A review of the item.".
- season comment "A season in a tv/radio series.".
- seller comment "An entity which offers (sells / leases / lends / loans) the services / goods. A seller may also be a provider.".
- serviceAudience comment "The audience eligible for this service.".
- sibling comment "A sibling of the person.".
- significantLink comment "One of the more significant URLs on the page. Typically, these are the non-navigation links that are clicked on the most.".
- spouse comment "The person's spouse.".
- startDate comment "The start date and time of the event, role or item (in <a href='http://en.wikipedia.org/wiki/ISO_8601'>ISO 8601 date format</a>).".
- subEvent comment "An Event that is part of this event. For example, a conference event includes many presentations, each of which is a subEvent of the conference.".
- suggestedAnswer comment "An answer (possibly one of several, possibly incorrect) to a Question, e.g. on a Question/Answer site.".
- track comment "A music recording (track)—usually a single song.".
- url comment "URL of the item.".
- workExample comment "Example/instance/realization/derivation of the concept of this creative work. eg. The paperback edition, first edition, or eBook.".
- odrs comment "A vocabulary that supports the publication of Open Data by providing the means to capture machine-readable \"rights statements\", e.g. the licensing information, copyright notices and attribution requirements that are associated with the publication and re-use of a dataset.".
- License comment "A legal document that describes the legal terms for re-use of some information. A licence might be applicable to content, data, or both. This definition of licence used here is deliberately loose, and is intended to also cover waiver documents that indicate that the owner waives all rights over some information, e.g. public domain dedications.".
- RightsStatement comment "A description of the rights and terms of re-use for a dataset. A rights statement will include a reference to one or more licences copyright notices, and attribution requirements. Where a Rights Statement refers to several licences the intention is that these should separately apply to the data and content associated with the dataset. An individual Rights Statement may be specific to a dataset or could be applied to a \nnumber of datasets published by the same organisation or person, where the rights associated with each dataset are identical.".
- Group comment "Any other resource may be a member of a group including other groups. The Grouping mechanism is expected to be useful for defining groups of entities such as “National Libraries”, “Central Libraries”, “Public Libraries” etc.".
- securityAlgorithms comment "An ontology to describe various cryptographic algorithms".
- HashAlgorithm comment "Key dependent function; useful in providing user authentication without a\nsecret key".
- hasNSALevel comment "These can be Typel, Type 2, Type3, or Type4".
- isNISTStandard comment "NIST FIPS Standard".
- Anonymity comment "(Secondary Objective) Provides anonymity".
- Authorization comment "Only authorized entities are allowed to access resources in an authorized\nmanner.\n(Aka Access Control). If desired, user may create instance of AccessControl as\nwell.".
- Confidentiality comment "Protects against information being disclosed or revealed to unauthorized\nparties.".
- CovertChannelPrevention comment "(Secondary Objective) Prevent or limit the existance of covert channels".
- HostTrust comment "(Secondary Objective) How to trust host or platform. Is relevant to Common\ncriteria, etc.".
- KeyManagement comment "(SecondaryObjective) Securely manages keys for legitimate users.".
- MessageAuthentication comment "Provides guarantee that message came from whoever claimed to have sent it.".
- Separation comment "(Secondary Objective)".
- UserAuthentication comment "Provides assurance of the identity of a person or entity.".
- supportsSecurityObjectives comment "Any SecurityConcept can support one or more of the Security Objectives defined\nin the SecurityObjective class".
- AccessControlMethod comment "Access Control is the mechanism that allows owners of resources to define, manage and enforce access conditions applicable to each resource.".
- ActiveAttack comment "Active attacks involve actions performed by adversaries to gain the control of the network.".
- AnonymityMethod comment "Anonymity protects user identity, making it hard to track the whereabouts of a certain user.".
- AntiSpam comment "".
- Antivirus comment "".
- Architecture comment "".
- ArchitectureComponent comment "".
- AsymmetricAlgorithm comment "The keys used for encryption and decryption are different, allowing for easier key distribution.".
- AsymmetricKey comment "".
- Attack comment "".
- AuthenticationMethod comment "Authentication prevents unauthorized access to the network.".
- AvailabilityMethod comment "Data availability ensures that the network is alive and that data are accessible.".
- BlockCipher comment "".
- BluetoothAttack comment "".
- BluetoothSecurityMechanism comment "".
- BluetoothTechnology comment "A protocol for short-range (up to 100 meters) wireless networks.".
- CloudAttack comment "".
- CloudSecurityMechanism comment "".
- CloudTechnology comment "".
- ConfidentialityMethod comment "Confidentiality means that only destined user must be able to read data.".
- CryptographicConcept comment "".
- DataFreshnessMethod comment "Data freshness suggests that the data is recent, and it ensures that no old messages have been replayed.".
- DataProvenanceType comment "".
- DataTypeSensitive comment "DataTypeSensitive (low, medium or high sensitive). The data to secure.".
- DatabaseAttack comment "".
- DatabaseSecurityMechanism comment "".
- DatabaseTechnology comment "".
- ECommerceAttack comment "".
- ECommerceTechnology comment "".
- EDGEAttack comment "".
- EDGESecurityMechanism comment "".
- EDGETechnology comment "Enhanced Data Rates for GSM Evolution (EDGE) or 2.75G".
- EncryptionAlgorithm comment "Encryption algorithm ensures the confidentiality property.".
- EthernetAttack comment "".
- EthernetSecurityMechanism comment "".
- EthernetTechnology comment "".
- Feature comment "Features of security mechanisms. For example a sensor technology is low energy consuming, and the symmetric algorithm (a SecurityMechanism) is low energy consumming.".
- FrameworkAttack comment "".
- FrameworkSecurityMechanism comment "".
- FrameworkTechnology comment "".
- GPRSArchitecture comment "The GPRS system are a much more expesed to intruders, because of its IP based backbone.".
- GPRSAttack comment "".
- GPRSSecurityMechanism comment "".
- GPRSTechnology comment "General Packet Radio Service (GPRS) or 2.5G".
- GSMArchitecture comment "".
- GSMAttack comment "".
- GSMSecurityMechanism comment "".
- GSMTechnology comment "Global System for Mobile Communication (GSM) or 2G".
- HSPDAAttack comment "".
- HSPDASecurityMechanism comment "".
- HSPDATechnology comment "High-Speed Download Packet Access (HSPDA) or 3.5G".
- IntegrityMethod comment "Data integrity guarantees that the transmitted messages are not modified by attackers, either due to malicious intent or by accident.".
- KeyManagement comment "Key management protocols are fundamental requirements to develop a secure application. These protocols are used to set up and distribute various kinds of cryptographic keys to nodes in the network.".
- LTEArchitecture comment "".
- LTEAttack comment "".
- LTESecurityMechanism comment "".
- LTETechnology comment "Long Term Evolution (LTE) Technology or 4G".
- M2MAttack comment "".
- M2MSecurityMechanism comment "".