https://mtp.linked.solutions/

http://xmlns.com/foaf/0.1/topic https://mtp.linked.solutions/security

http://securitytoolbox.appspot.com/securityMain#Kerberos

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#AuthenticationProtocol

http://securitytoolbox.appspot.com/securityMain#XML-enc

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#EncryptionProtocol

http://securitytoolbox.appspot.com/securityMain#IPSec

http://securitytoolbox.appspot.com/securityMain#supportsSecurityObjectives http://securitytoolbox.appspot.com/securityMain#Integrity
http://securitytoolbox.appspot.com/securityMain#Confidentiality
http://securitytoolbox.appspot.com/securityMain#MessageAuthentication
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#NetworkSecurityProtocol

http://securitytoolbox.appspot.com/securityMain#hasAssurance

http://www.w3.org/2000/01/rdf-schema#range http://www.kim.com/NRLOntologyFiles/securityAssurance.owl#Assurance
http://www.w3.org/2000/01/rdf-schema#label hasAssurance
http://www.w3.org/2000/01/rdf-schema#domain _:0
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#ObjectProperty

http://securitytoolbox.appspot.com/securityMain#ChineseWall

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#CommercialPolicy

http://securitytoolbox.appspot.com/securityMain#XML-dsig

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#SignatureProtocol

http://securitytoolbox.appspot.com/securityMain#ClarkWilson

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#CommercialPolicy

http://securitytoolbox.appspot.com/securityMain#ReplayPrevention

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#SecurityObjective
http://www.w3.org/2000/01/rdf-schema#comment (Secondary Objective) Protect against replay attacks

http://securitytoolbox.appspot.com/securityMain#

http://purl.org/dc/elements/1.1/description An ontology to describe various cryptographic algorithms
http://www.w3.org/2003/06/sw-vocab-status/ns#term_status Finished
http://purl.org/dc/elements/1.1/creator mailto:luo@itd.nrl.navy.mil
mailto:mkang@itd.nrl.navy.mil
mailto:kim@itd.nrl.navy.mil
http://purl.org/vocab/vann/preferredNamespacePrefix algo
http://creativecommons.org/ns#license http://creativecommons.org/licenses/by/3.0/
http://purl.org/dc/terms/issued 2005-08-31
http://purl.org/dc/terms/source http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA437938
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Ontology
http://purl.org/vocommons/voaf#Vocabulary
http://www.w3.org/2002/07/owl#versionInfo 0.2
http://www.w3.org/2000/01/rdf-schema#comment A security ontology to annotate resources with security-related information
http://purl.org/vocab/vann/preferredNamespaceUri http://securitytoolbox.appspot.com/securityMain#
http://www.w3.org/2004/02/skos/core#historyNote Ontology extracted from the paper Security Ontology for Annotating Resources. [Kim et al. 2005] (See APPENDIX D. OWL Representations of the NRL Security Ontology) Security ontology to faciliate web service description and discovery.
http://purl.org/dc/elements/1.1/title Security Main
http://purl.org/dc/terms/modified 2015-03-27
http://purl.org/dc/elements/1.1/contributor mailto:gyrard@eurecom.fr

http://securitytoolbox.appspot.com/securityMain#Availability

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#SecurityObjective
http://www.w3.org/2000/01/rdf-schema#comment Provides guarantee that resource is available to authorized users at any authorized time.

http://securitytoolbox.appspot.com/securityMain#OnionRouter

http://securitytoolbox.appspot.com/securityMain#supportsSecurityObjectives http://securitytoolbox.appspot.com/securityMain#Confidentiality
http://securitytoolbox.appspot.com/securityMain#Anonymity
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#NetworkMechanism

http://securitytoolbox.appspot.com/securityMain#LoginProtocol

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#AuthenticationProtocol

http://securitytoolbox.appspot.com/securityMain#hasSignatureAlgorithm

http://www.w3.org/2000/01/rdf-schema#range http://securitytoolbox.appspot.com/securityAlgorithms#SignatureAlgorithm
http://www.w3.org/2000/01/rdf-schema#label hasSignatureAlgorithm
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#ObjectProperty
http://www.w3.org/2000/01/rdf-schema#subPropertyOf http://securitytoolbox.appspot.com/securityMain#hasAlgorithm

http://securitytoolbox.appspot.com/securityMain#MessageIntegrity

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#SecurityObjective
http://www.w3.org/2000/01/rdf-schema#comment Data integrity or Message integrity; data cannot be changed, deleted, modified, etc by unauthorized parties.

http://securitytoolbox.appspot.com/securityMain#reqCredential

http://www.w3.org/2000/01/rdf-schema#range http://www.kim.com/NRLOntologyFiles/credentials.owl#Credential
http://www.w3.org/2000/01/rdf-schema#label reqCredential
http://www.w3.org/2000/01/rdf-schema#domain http://securitytoolbox.appspot.com/securityMain#SecurityProtocol
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#ObjectProperty

http://securitytoolbox.appspot.com/securityMain#BLP

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#MilitaryPolicy
http://www.w3.org/2000/01/rdf-schema#comment Bell La-Padula

http://securitytoolbox.appspot.com/securityMain#RBAC

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#SecurityPolicy
http://www.w3.org/2000/01/rdf-schema#comment Role-based Access Control

http://securitytoolbox.appspot.com/securityMain#VPN

http://securitytoolbox.appspot.com/securityMain#supportsSecurityObjectives http://securitytoolbox.appspot.com/securityMain#Separation
http://securitytoolbox.appspot.com/securityMain#Confidentiality
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#NetworkMechanism

http://securitytoolbox.appspot.com/securityMain#TrafficHiding

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#SecurityObjective
http://www.w3.org/2000/01/rdf-schema#comment (Secondary Objective) Pad traffic with bogus data to hide traffic patterns

http://securitytoolbox.appspot.com/securityMain#SSH

http://securitytoolbox.appspot.com/securityMain#supportsSecurityObjectives http://securitytoolbox.appspot.com/securityMain#Integrity
http://securitytoolbox.appspot.com/securityMain#Confidentiality
http://securitytoolbox.appspot.com/securityMain#UserAuthentication
http://securitytoolbox.appspot.com/securityMain#MessageAuthentication
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#NetworkSecurityProtocol

http://securitytoolbox.appspot.com/securityMain#Trust

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#SecurityObjective
http://www.w3.org/2000/01/rdf-schema#comment (Secondary Objective) How to trust entity. Trust not only of identification, but statements, claims, etc.

http://securitytoolbox.appspot.com/securityMain#hasEncryptionAlgorithm

http://www.w3.org/2000/01/rdf-schema#range http://securitytoolbox.appspot.com/securityAlgorithms#EncryptionAlgorithm
http://www.w3.org/2000/01/rdf-schema#label hasEncryptionAlgorithm
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#ObjectProperty
http://www.w3.org/2000/01/rdf-schema#subPropertyOf http://securitytoolbox.appspot.com/securityMain#hasAlgorithm

http://securitytoolbox.appspot.com/securityMain#XKMS

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#KeyManagementProtocol

http://securitytoolbox.appspot.com/securityMain#ApplicationMechanism

http://www.w3.org/2000/01/rdf-schema#label Application Mechanism
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Class
http://www.w3.org/2000/01/rdf-schema#subClassOf http://securitytoolbox.appspot.com/securityMain#SecurityMechanism

http://securitytoolbox.appspot.com/securityMain#SoapFirewall

http://securitytoolbox.appspot.com/securityMain#supportsSecurityObjectives http://securitytoolbox.appspot.com/securityMain#Authorization
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#ServiceMechanism

http://securitytoolbox.appspot.com/securityMain#VMM

http://securitytoolbox.appspot.com/securityMain#supportsSecurityObjectives http://securitytoolbox.appspot.com/securityMain#HostTrust
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#HostMechanism

http://securitytoolbox.appspot.com/securityMain#Safehost

http://securitytoolbox.appspot.com/securityMain#supportsSecurityObjectives http://securitytoolbox.appspot.com/securityMain#HostTrust
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#HostMechanism

http://securitytoolbox.appspot.com/securityMain#MLSPump

http://securitytoolbox.appspot.com/securityMain#supportsSecurityObjectives http://securitytoolbox.appspot.com/securityMain#CovertChannelPrevention
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#NetworkMechanism

http://securitytoolbox.appspot.com/securityMain#SAML

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#AuthenticationProtocol

http://securitytoolbox.appspot.com/securityMain#NetworkMechanism

http://www.w3.org/2000/01/rdf-schema#label Network Mechanism
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Class
http://www.w3.org/2000/01/rdf-schema#subClassOf http://securitytoolbox.appspot.com/securityMain#SecurityMechanism

http://securitytoolbox.appspot.com/securityMain#NetworkSecurityProtocol

http://www.w3.org/2000/01/rdf-schema#label Network Security Protocol
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Class
http://www.w3.org/2000/01/rdf-schema#subClassOf http://securitytoolbox.appspot.com/securityMain#SecurityProtocol

http://securitytoolbox.appspot.com/securityMain#SecurityMechanism

http://www.w3.org/2000/01/rdf-schema#label Security Mechanism
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Class
http://www.w3.org/2000/01/rdf-schema#subClassOf http://securitytoolbox.appspot.com/securityMain#SecurityConcept

http://securitytoolbox.appspot.com/securityMain#ServiceMechanism

http://www.w3.org/2000/01/rdf-schema#label Service Mechanism
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Class
http://www.w3.org/2000/01/rdf-schema#subClassOf http://securitytoolbox.appspot.com/securityMain#SecurityMechanism

mailto:luo@itd.nrl.navy.mil

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://xmlns.com/foaf/0.1/Person
http://xmlns.com/foaf/0.1/name Jim Luo

http://securitytoolbox.appspot.com/securityMain#KeyManagement

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#SecurityObjective
http://www.w3.org/2000/01/rdf-schema#comment (SecondaryObjective) Securely manages keys for legitimate users.

https://mtp.linked.solutions/security

http://purl.org/dc/terms/source https://github.com/linked-solutions/prefix.cc-harvest/master
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Ontology
http://purl.org/vocab/vann/preferredNamespaceUri http://securitytoolbox.appspot.com/securityMain#
http://purl.org/vocab/vann/preferredNamespacePrefix security
http://rdfs.org/ns/void#triples 194

http://securitytoolbox.appspot.com/securityMain#CovertChannelPrevention

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#SecurityObjective
http://www.w3.org/2000/01/rdf-schema#comment (Secondary Objective) Prevent or limit the existance of covert channels

_:1

http://www.w3.org/1999/02/22-rdf-syntax-ns#first http://securitytoolbox.appspot.com/securityMain#SecurityProtocol
http://www.w3.org/1999/02/22-rdf-syntax-ns#rest _:2

http://securitytoolbox.appspot.com/securityMain#HostTrust

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#SecurityObjective
http://www.w3.org/2000/01/rdf-schema#comment (Secondary Objective) How to trust host or platform. Is relevant to Common criteria, etc.

_:3

http://www.w3.org/2002/07/owl#hasValue http://securitytoolbox.appspot.com/securityMain#UserAuthentication
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Restriction
http://www.w3.org/2002/07/owl#onProperty http://securitytoolbox.appspot.com/securityMain#supportsSecurityObjectives

mailto:mkang@itd.nrl.navy.mil

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://xmlns.com/foaf/0.1/Person
http://xmlns.com/foaf/0.1/name Myong Kang

http://securitytoolbox.appspot.com/securityMain#KeyManagementProtocol

http://www.w3.org/2000/01/rdf-schema#label Key Management Protocol
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Class
http://www.w3.org/2000/01/rdf-schema#subClassOf http://securitytoolbox.appspot.com/securityMain#SecurityProtocol
_:4

_:5

http://www.w3.org/2002/07/owl#hasValue http://securitytoolbox.appspot.com/securityMain#MessageAuthentication
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Restriction
http://www.w3.org/2002/07/owl#onProperty http://securitytoolbox.appspot.com/securityMain#supportsSecurityObjectives

_:2

http://www.w3.org/1999/02/22-rdf-syntax-ns#first http://securitytoolbox.appspot.com/securityMain#SecurityMechanism
http://www.w3.org/1999/02/22-rdf-syntax-ns#rest http://www.w3.org/1999/02/22-rdf-syntax-ns#nil

http://securitytoolbox.appspot.com/securityMain#SecurityObjective

http://www.w3.org/2000/01/rdf-schema#label Security Objective
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Class

mailto:kim@itd.nrl.navy.mil

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://xmlns.com/foaf/0.1/Person
http://xmlns.com/foaf/0.1/name Anya Kim

http://securitytoolbox.appspot.com/securityMain#Authorization

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#SecurityObjective
http://www.w3.org/2000/01/rdf-schema#comment Only authorized entities are allowed to access resources in an authorized manner. (Aka Access Control). If desired, user may create instance of AccessControl as well.

_:6

http://www.w3.org/2002/07/owl#hasValue http://securitytoolbox.appspot.com/securityMain#Confidentiality
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Restriction
http://www.w3.org/2002/07/owl#onProperty http://securitytoolbox.appspot.com/securityMain#supportsSecurityObjectives

http://securitytoolbox.appspot.com/securityMain#AuthenticationProtocol

http://www.w3.org/2000/01/rdf-schema#label Authentication Protocol
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Class
http://www.w3.org/2000/01/rdf-schema#subClassOf _:3
http://securitytoolbox.appspot.com/securityMain#SecurityProtocol

http://securitytoolbox.appspot.com/securityMain#HostMechanism

http://www.w3.org/2000/01/rdf-schema#label Host Mechanism
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Class
http://www.w3.org/2000/01/rdf-schema#subClassOf http://securitytoolbox.appspot.com/securityMain#SecurityMechanism

http://securitytoolbox.appspot.com/securityMain#SecurityConcept

http://www.w3.org/2000/01/rdf-schema#label Security Concept
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Class

http://securitytoolbox.appspot.com/securityMain#supportsSecurityObjectives

http://www.w3.org/2000/01/rdf-schema#range http://securitytoolbox.appspot.com/securityMain#SecurityObjective
http://www.w3.org/2000/01/rdf-schema#label supports Security Objectives
http://www.w3.org/2000/01/rdf-schema#domain http://securitytoolbox.appspot.com/securityMain#SecurityConcept
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#ObjectProperty
http://www.w3.org/2000/01/rdf-schema#comment Any SecurityConcept can support one or more of the Security Objectives defined in the SecurityObjective class

http://securitytoolbox.appspot.com/securityMain#Confidentiality

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#SecurityObjective
http://www.w3.org/2000/01/rdf-schema#comment Protects against information being disclosed or revealed to unauthorized parties.

http://securitytoolbox.appspot.com/securityMain#MilitaryPolicy

http://www.w3.org/2000/01/rdf-schema#label Military Policy
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Class
http://www.w3.org/2000/01/rdf-schema#subClassOf http://securitytoolbox.appspot.com/securityMain#SecurityPolicy

http://securitytoolbox.appspot.com/securityMain#SecurityPolicy

http://www.w3.org/2000/01/rdf-schema#label Security Policy
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Class
http://www.w3.org/2000/01/rdf-schema#subClassOf http://securitytoolbox.appspot.com/securityMain#SecurityConcept
_:7

http://securitytoolbox.appspot.com/securityMain#Anonymity

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#SecurityObjective
http://www.w3.org/2000/01/rdf-schema#comment (Secondary Objective) Provides anonymity

http://securitytoolbox.appspot.com/securityMain#SecurityProtocol

http://www.w3.org/2000/01/rdf-schema#label Security Protocol
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Class
http://www.w3.org/2000/01/rdf-schema#subClassOf http://securitytoolbox.appspot.com/securityMain#SecurityConcept

_:0

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Class
http://www.w3.org/2002/07/owl#unionOf _:1

http://securitytoolbox.appspot.com/securityMain#EncryptionProtocol

http://www.w3.org/2000/01/rdf-schema#label Encryption Protocol
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Class
http://www.w3.org/2000/01/rdf-schema#subClassOf http://securitytoolbox.appspot.com/securityMain#SecurityProtocol
_:6

http://securitytoolbox.appspot.com/securityMain#TLS

http://securitytoolbox.appspot.com/securityMain#supportsSecurityObjectives http://securitytoolbox.appspot.com/securityMain#Confidentiality
http://securitytoolbox.appspot.com/securityMain#UserAuthentication
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#NetworkSecurityProtocol
http://www.w3.org/2002/07/owl#sameAs http://securitytoolbox.appspot.com/securityMain#SSL

http://securitytoolbox.appspot.com/securityMain#Separation

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#SecurityObjective
http://www.w3.org/2000/01/rdf-schema#comment (Secondary Objective)

http://securitytoolbox.appspot.com/securityMain#SignatureProtocol

http://www.w3.org/2000/01/rdf-schema#label Signature Protocol
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Class
http://www.w3.org/2000/01/rdf-schema#subClassOf _:5
http://securitytoolbox.appspot.com/securityMain#SecurityProtocol

mailto:gyrard@eurecom.fr

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://xmlns.com/foaf/0.1/Person
http://xmlns.com/foaf/0.1/name Amelie Gyrard

_:4

http://www.w3.org/2002/07/owl#hasValue http://securitytoolbox.appspot.com/securityMain#KeyManagement
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Restriction
http://www.w3.org/2002/07/owl#onProperty http://securitytoolbox.appspot.com/securityMain#supportsSecurityObjectives

_:7

http://www.w3.org/2002/07/owl#hasValue http://securitytoolbox.appspot.com/Authorization
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Restriction
http://www.w3.org/2002/07/owl#onProperty http://securitytoolbox.appspot.com/supportsSecurityObjectives

http://securitytoolbox.appspot.com/securityMain#UserAuthentication

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#SecurityObjective
http://www.w3.org/2000/01/rdf-schema#comment Provides assurance of the identity of a person or entity.

http://securitytoolbox.appspot.com/securityMain#MessageAuthentication

http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#SecurityObjective
http://www.w3.org/2000/01/rdf-schema#comment Provides guarantee that message came from whoever claimed to have sent it.

http://securitytoolbox.appspot.com/securityMain#SSL

http://securitytoolbox.appspot.com/securityMain#supportsSecurityObjectives http://securitytoolbox.appspot.com/securityMain#Confidentiality
http://securitytoolbox.appspot.com/securityMain#UserAuthentication
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://securitytoolbox.appspot.com/securityMain#NetworkSecurityProtocol
http://www.w3.org/2002/07/owl#sameAs http://securitytoolbox.appspot.com/securityMain#TLS

http://securitytoolbox.appspot.com/securityMain#CommercialPolicy

http://www.w3.org/2000/01/rdf-schema#label Commercial Policy
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#Class
http://www.w3.org/2000/01/rdf-schema#subClassOf http://securitytoolbox.appspot.com/securityMain#SecurityPolicy

http://securitytoolbox.appspot.com/securityMain#hasAlgorithm

http://www.w3.org/2000/01/rdf-schema#range http://securitytoolbox.appspot.com/securityAlgorithms#Algorithm
http://www.w3.org/2000/01/rdf-schema#label hasAlgorithm
http://www.w3.org/2000/01/rdf-schema#domain http://securitytoolbox.appspot.com/securityMain#SecurityProtocol
http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.w3.org/2002/07/owl#ObjectProperty