Research Article

On the Modelling of Context-Aware Security for Mobile Devices

Algorithm 2

Algorithm of the security attributes context evaluation: CONTEXT().
()
() SET
()
()
() for   to   do
()  for   to   do
()   if    then
()    EXCLUDE from
()   end if
()  end for
() end for
()
() if    then
()  ERROR
() end if
() SET
() SET
() for   to   do
()  if    then
()   
()  end if
() end for
() RETURN