Research Article
On the Modelling of Context-Aware Security for Mobile Devices
Algorithm 1
Security attributes adaptation algorithm.
) SET | () SET | () | () SET | () | () SET | () | () if then | () | () | () end if | () if then | () do | () foreach in do | () if then | () | () | () end if | () | () | () | () | () if then | () | () end if | () while () | () end if | () if then | () | () end if |
|