prov:value
| - However, in such a security management system based on authentication, such as a user ID, password, access restriction, etc., of a user, the management of an access log, such as one performing a check of the access log by a legal user or manager and a verification of whether the access has been made by the legal user, the manager or another legal user, etc., is always required in order to check wh
|