Research Article
On the Modelling of Context-Aware Security for Mobile Devices
Algorithm 2
Algorithm of the security attributes context evaluation: CONTEXT(
).
() | () SET | () | () | () for to do | () for to do | () if then | () EXCLUDE from | () end if | () end for | () end for | () | () if then | () ERROR | () end if | () SET | () SET | () for to do | () if then | () | () end if | () end for | () RETURN |
|