
|
Applicability Public-facing account for data miners and abusive users Privacy pluggable authentication for adaptable authorization Structured well-understood multiple methods of alternative contact I18N localization of protocol elements multiple language contact equivalents standard queries and results |