Research Article

On the Modelling of Context-Aware Security for Mobile Devices

Algorithm 1

Security attributes adaptation algorithm.
) SET
() SET
()
() SET
()
() SET
()
() if    then
()  
()  
() end if
() if    then
()  do
()  foreach   in   do  
()  if     then
()   
()   
()  end if
()  
()  
()  
()  
()  if    then
()   
()  end if
()  while  ()
() end if
() if    then
()  
() end if