<?xml version="1.0" encoding="UTF-8"?> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:ns0="https://w3id.org/dpv#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:vann="http://purl.org/vocab/vann/" xmlns:ns1="https://w3id.org/dpv/examples#" xmlns:dct="http://purl.org/dc/terms/" xmlns:ns2="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:metadata_def="http://data.bioontology.org/metadata/def/"> <skos:Concept rdf:about="https://w3id.org/dpv#TechnicalMeasure"> <rdf:type rdf:resource="http://www.w3.org/2002/07/owl#Class"/> <rdf:type rdf:resource="http://www.w3.org/2002/07/owl#NamedIndividual"/> <rdfs:subClassOf rdf:resource="https://w3id.org/dpv#TechnicalOrganisationalMeasure"/> <vann:example rdf:resource="https://w3id.org/dpv/examples#E0020"/> <vann:example rdf:resource="https://w3id.org/dpv/examples#E0064"/> <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalOrganisationalMeasure"/> <skos:definition xml:lang="en">Technical measures used to safeguard and ensure good practices in connection with data and technologies</skos:definition> <skos:prefLabel xml:lang="en">Technical Measure</skos:prefLabel> <skos:inScheme rdf:resource="https://w3id.org/dpv#TOM-classes"/> <dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2019-04-05</dct:created> <dct:modified rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2023-12-10</dct:modified> <ns2:term_status xml:lang="en">accepted</ns2:term_status> <dct:contributor>Axel Polleres, Rob Brennan, Harshvardhan J. Pandit, Mark Lizar</dct:contributor> <metadata_def:mappingLoom>technicalmeasure</metadata_def:mappingLoom> <metadata_def:mappingSameURI rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/> <rdfs:isDefinedBy rdf:resource="https://w3id.org/dpv#"/> </skos:Concept> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AccessControlMethod"> <skos:broader> <rdf:Description rdf:about="https://w3id.org/dpv#TechnicalMeasure"> <metadata_def:mappingSameURI rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/> </rdf:Description> </skos:broader> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#ActivityMonitoring"> <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Anonymisation"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AsymmetricCryptography"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AsymmetricEncryption"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Authentication-ABC"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Authentication-PABC"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AuthenticationProtocols"> <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AuthorisationProtocols"> <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#BiometricAuthentication"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#CryptographicAuthentication"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#CryptographicKeyManagement"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#CryptographicMethods"> <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DataBackupProtocols"> <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DataRedaction"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DataSanitisationTechnique"> <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Deidentification"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DeterministicPseudonymisation"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DifferentialPrivacy"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DigitalRightsManagement"> <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DigitalSignatures"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DistributedSystemSecurity"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DocumentRandomisedPseudonymisation"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DocumentSecurity"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Encryption"> <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#EncryptionAtRest"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#EncryptionInTransfer"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#EncryptionInUse"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#EndToEndEncryption"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#FileSystemSecurity"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#FullyRandomisedPseudonymisation"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#HardwareSecurityProtocols"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#HashFunctions"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#HashMessageAuthenticationCode"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#HomomorphicEncryption"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#InformationFlowControl"> <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#IntrusionDetectionSystem"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#MessageAuthenticationCodes"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#MobilePlatformSecurity"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#MonotonicCounterPseudonymisation"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#MultiFactorAuthentication"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#NetworkProxyRouting"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#NetworkSecurityProtocols"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#OperatingSystemSecurity"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PasswordAuthentication"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PenetrationTestingMethods"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PostQuantumCryptography"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PrivacyPreservingProtocol"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PrivateInformationRetrieval"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Pseudonymisation"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#QuantumCryptography"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#RNGPseudonymisation"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SecretSharingSchemes"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SecureMultiPartyComputation"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SecurityMethod"> <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SingleSignOn"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SymmetricCryptography"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SymmetricEncryption"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#TrustedComputing"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#TrustedExecutionEnvironment"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#UsageControl"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#UseSyntheticData"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#VirtualisationSecurity"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#VulnerabilityTestingMethods"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#WebBrowserSecurity"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#WebSecurityProtocols"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#WirelessSecurityProtocols"> </ns0:TechnicalMeasure> <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#ZeroKnowledgeAuthentication"> </ns0:TechnicalMeasure> <rdf:Description rdf:about="https://w3id.org/dpv#hasTechnicalMeasure"> <ns3:rangeIncludes rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/> <ns4:rangeIncludes rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/> </rdf:Description> </rdf:RDF>
<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:ns0="https://w3id.org/dpv#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:vann="http://purl.org/vocab/vann/" xmlns:ns1="https://w3id.org/dpv/examples#" xmlns:dct="http://purl.org/dc/terms/" xmlns:ns2="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:metadata_def="http://data.bioontology.org/metadata/def/">
  <skos:Concept rdf:about="https://w3id.org/dpv#TechnicalMeasure">
    <rdf:type rdf:resource="http://www.w3.org/2002/07/owl#Class"/>
    <rdf:type rdf:resource="http://www.w3.org/2002/07/owl#NamedIndividual"/>
    <rdfs:subClassOf rdf:resource="https://w3id.org/dpv#TechnicalOrganisationalMeasure"/>
    <vann:example rdf:resource="https://w3id.org/dpv/examples#E0020"/>
    <vann:example rdf:resource="https://w3id.org/dpv/examples#E0064"/>
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalOrganisationalMeasure"/>
    <skos:definition xml:lang="en">Technical measures used to safeguard and ensure good practices in connection with data and technologies</skos:definition>
    <skos:prefLabel xml:lang="en">Technical Measure</skos:prefLabel>
    <skos:inScheme rdf:resource="https://w3id.org/dpv#TOM-classes"/>
    <dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2019-04-05</dct:created>
    <dct:modified rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2023-12-10</dct:modified>
    <ns2:term_status xml:lang="en">accepted</ns2:term_status>
    <dct:contributor>Axel Polleres, Rob Brennan, Harshvardhan J. Pandit, Mark Lizar</dct:contributor>
    <metadata_def:mappingLoom>technicalmeasure</metadata_def:mappingLoom>
    <metadata_def:mappingSameURI rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
    <rdfs:isDefinedBy rdf:resource="https://w3id.org/dpv#"/>
  </skos:Concept>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AccessControlMethod">
    <skos:broader>
      <rdf:Description rdf:about="https://w3id.org/dpv#TechnicalMeasure">
        <metadata_def:mappingSameURI rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
      </rdf:Description>
    </skos:broader>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#ActivityMonitoring">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Anonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AsymmetricCryptography">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AsymmetricEncryption">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Authentication-ABC">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Authentication-PABC">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AuthenticationProtocols">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#AuthorisationProtocols">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#BiometricAuthentication">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#CryptographicAuthentication">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#CryptographicKeyManagement">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#CryptographicMethods">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DataBackupProtocols">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DataRedaction">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DataSanitisationTechnique">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Deidentification">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DeterministicPseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DifferentialPrivacy">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DigitalRightsManagement">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DigitalSignatures">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DistributedSystemSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DocumentRandomisedPseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#DocumentSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Encryption">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#EncryptionAtRest">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#EncryptionInTransfer">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#EncryptionInUse">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#EndToEndEncryption">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#FileSystemSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#FullyRandomisedPseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#HardwareSecurityProtocols">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#HashFunctions">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#HashMessageAuthenticationCode">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#HomomorphicEncryption">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#InformationFlowControl">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#IntrusionDetectionSystem">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#MessageAuthenticationCodes">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#MobilePlatformSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#MonotonicCounterPseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#MultiFactorAuthentication">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#NetworkProxyRouting">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#NetworkSecurityProtocols">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#OperatingSystemSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PasswordAuthentication">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PenetrationTestingMethods">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PostQuantumCryptography">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PrivacyPreservingProtocol">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#PrivateInformationRetrieval">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#Pseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#QuantumCryptography">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#RNGPseudonymisation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SecretSharingSchemes">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SecureMultiPartyComputation">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SecurityMethod">
    <skos:broader rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SingleSignOn">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SymmetricCryptography">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#SymmetricEncryption">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#TrustedComputing">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#TrustedExecutionEnvironment">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#UsageControl">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#UseSyntheticData">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#VirtualisationSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#VulnerabilityTestingMethods">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#WebBrowserSecurity">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#WebSecurityProtocols">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#WirelessSecurityProtocols">
  </ns0:TechnicalMeasure>
  <ns0:TechnicalMeasure rdf:about="https://w3id.org/dpv#ZeroKnowledgeAuthentication">
  </ns0:TechnicalMeasure>
  <rdf:Description rdf:about="https://w3id.org/dpv#hasTechnicalMeasure">
    <ns3:rangeIncludes rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
    <ns4:rangeIncludes rdf:resource="https://w3id.org/dpv#TechnicalMeasure"/>
  </rdf:Description>
</rdf:RDF>