<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:ns0="https://w3id.org/dpv#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:vann="http://purl.org/vocab/vann/" xmlns:ns1="https://w3id.org/dpv/examples#" xmlns:dct="http://purl.org/dc/terms/" xmlns:ns2="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:metadata_def="http://data.bioontology.org/metadata/def/">
  <skos:Concept rdf:about="https://w3id.org/dpv#TechnicalMeasure">
    <rdf:type rdf:resource="http://www.w3.org/2002/07/owl#Class"/>
    <rdf:type rdf:resource="http://www.w3.org/2002/07/owl#NamedIndividual"/>
    <rdfs:subClassOf rdf:resource="https://w3id.org/dpv#TechnicalOrganisationalMeasure"/>
    <vann:example rdf:resource="https://w3id.org/dpv/examples#E0020"/>
    <vann:example rdf:resource="https://w3id.org/dpv/examples#E0064"/>
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalOrganisationalMeasure"/>
    <skos:definition xml:lang="en">Technical measures used to safeguard and ensure good practices in connection with data and technologies</skos:definition>
    <skos:prefLabel xml:lang="en">Technical Measure</skos:prefLabel>
    <skos:inScheme rdf:resource="https://w3id.org/dpv#TOM-classes"/>
    <dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2019-04-05</dct:created>
    <dct:modified rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2023-12-10</dct:modified>
    <ns2:term_status xml:lang="en">accepted</ns2:term_status>
    <dct:contributor>Axel Polleres, Rob Brennan, Harshvardhan J. Pandit, Mark Lizar</dct:contributor>
    <metadata_def:mappingLoom>technicalmeasure</metadata_def:mappingLoom>
    <metadata_def:mappingSameURI rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
    <rdfs:isDefinedBy rdf:resource="https://w3id.org/dpv#"/>
  </skos:Concept>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AccessControlMethod">
    <skos:broader>
      <rdf:Description rdf:about="https://w3id.org/dpv#TechnicalMeasure">
        <metadata_def:mappingSameURI rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
      </rdf:Description>
    </skos:broader>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#ActivityMonitoring">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Anonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AsymmetricCryptography">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AsymmetricEncryption">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Authentication-ABC">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Authentication-PABC">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AuthenticationProtocols">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AuthorisationProtocols">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#BiometricAuthentication">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#CryptographicAuthentication">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#CryptographicKeyManagement">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#CryptographicMethods">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DataBackupProtocols">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DataRedaction">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DataSanitisationTechnique">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Deidentification">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DeterministicPseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DifferentialPrivacy">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DigitalRightsManagement">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DigitalSignatures">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DistributedSystemSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DocumentRandomisedPseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DocumentSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Encryption">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#EncryptionAtRest">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#EncryptionInTransfer">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#EncryptionInUse">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#EndToEndEncryption">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#FileSystemSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#FullyRandomisedPseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#HardwareSecurityProtocols">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#HashFunctions">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#HashMessageAuthenticationCode">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#HomomorphicEncryption">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#InformationFlowControl">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#IntrusionDetectionSystem">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#MessageAuthenticationCodes">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#MobilePlatformSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#MonotonicCounterPseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#MultiFactorAuthentication">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#NetworkProxyRouting">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#NetworkSecurityProtocols">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#OperatingSystemSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PasswordAuthentication">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PenetrationTestingMethods">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PostQuantumCryptography">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PrivacyPreservingProtocol">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PrivateInformationRetrieval">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Pseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#QuantumCryptography">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#RNGPseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SecretSharingSchemes">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SecureMultiPartyComputation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SecurityMethod">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SingleSignOn">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SymmetricCryptography">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SymmetricEncryption">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#TrustedComputing">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#TrustedExecutionEnvironment">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#UsageControl">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#UseSyntheticData">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#VirtualisationSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#VulnerabilityTestingMethods">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#WebBrowserSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#WebSecurityProtocols">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#WirelessSecurityProtocols">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#ZeroKnowledgeAuthentication">
  </ns0:TechnicalMeasure>
  <rdf:Description rdf:about="https://w3id.org/dpv#hasTechnicalMeasure">
    <ns3:rangeIncludes rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
    <ns4:rangeIncludes rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </rdf:Description>
</rdf:RDF>
 
 
<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:ns0="https://w3id.org/dpv#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:vann="http://purl.org/vocab/vann/" xmlns:ns1="https://w3id.org/dpv/examples#" xmlns:dct="http://purl.org/dc/terms/" xmlns:ns2="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:metadata_def="http://data.bioontology.org/metadata/def/">
  <skos:Concept rdf:about="https://w3id.org/dpv#TechnicalMeasure">
    <rdf:type rdf:resource="http://www.w3.org/2002/07/owl#Class"/>
    <rdf:type rdf:resource="http://www.w3.org/2002/07/owl#NamedIndividual"/>
    <rdfs:subClassOf rdf:resource="https://w3id.org/dpv#TechnicalOrganisationalMeasure"/>
    <vann:example rdf:resource="https://w3id.org/dpv/examples#E0020"/>
    <vann:example rdf:resource="https://w3id.org/dpv/examples#E0064"/>
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalOrganisationalMeasure"/>
    <skos:definition xml:lang="en">Technical measures used to safeguard and ensure good practices in connection with data and technologies</skos:definition>
    <skos:prefLabel xml:lang="en">Technical Measure</skos:prefLabel>
    <skos:inScheme rdf:resource="https://w3id.org/dpv#TOM-classes"/>
    <dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2019-04-05</dct:created>
    <dct:modified rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2023-12-10</dct:modified>
    <ns2:term_status xml:lang="en">accepted</ns2:term_status>
    <dct:contributor>Axel Polleres, Rob Brennan, Harshvardhan J. Pandit, Mark Lizar</dct:contributor>
    <metadata_def:mappingLoom>technicalmeasure</metadata_def:mappingLoom>
    <metadata_def:mappingSameURI rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
    <rdfs:isDefinedBy rdf:resource="https://w3id.org/dpv#"/>
  </skos:Concept>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AccessControlMethod">
    <skos:broader>
      <rdf:Description rdf:about="https://w3id.org/dpv#TechnicalMeasure">
        <metadata_def:mappingSameURI rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
      </rdf:Description>
    </skos:broader>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#ActivityMonitoring">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Anonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AsymmetricCryptography">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AsymmetricEncryption">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Authentication-ABC">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Authentication-PABC">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AuthenticationProtocols">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AuthorisationProtocols">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#BiometricAuthentication">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#CryptographicAuthentication">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#CryptographicKeyManagement">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#CryptographicMethods">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DataBackupProtocols">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DataRedaction">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DataSanitisationTechnique">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Deidentification">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DeterministicPseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DifferentialPrivacy">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DigitalRightsManagement">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DigitalSignatures">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DistributedSystemSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DocumentRandomisedPseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DocumentSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Encryption">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#EncryptionAtRest">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#EncryptionInTransfer">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#EncryptionInUse">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#EndToEndEncryption">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#FileSystemSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#FullyRandomisedPseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#HardwareSecurityProtocols">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#HashFunctions">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#HashMessageAuthenticationCode">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#HomomorphicEncryption">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#InformationFlowControl">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#IntrusionDetectionSystem">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#MessageAuthenticationCodes">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#MobilePlatformSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#MonotonicCounterPseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#MultiFactorAuthentication">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#NetworkProxyRouting">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#NetworkSecurityProtocols">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#OperatingSystemSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PasswordAuthentication">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PenetrationTestingMethods">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PostQuantumCryptography">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PrivacyPreservingProtocol">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PrivateInformationRetrieval">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Pseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#QuantumCryptography">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#RNGPseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SecretSharingSchemes">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SecureMultiPartyComputation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SecurityMethod">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SingleSignOn">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SymmetricCryptography">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SymmetricEncryption">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#TrustedComputing">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#TrustedExecutionEnvironment">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#UsageControl">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#UseSyntheticData">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#VirtualisationSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#VulnerabilityTestingMethods">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#WebBrowserSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#WebSecurityProtocols">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#WirelessSecurityProtocols">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#ZeroKnowledgeAuthentication">
  </ns0:TechnicalMeasure>
  <rdf:Description rdf:about="https://w3id.org/dpv#hasTechnicalMeasure">
    <ns3:rangeIncludes rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
    <ns4:rangeIncludes rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </rdf:Description>
</rdf:RDF>