16.4. RDF Graphs Security