Research Article

On the Modelling of Context-Aware Security for Mobile Devices

Table 1

Model comparison.

[6][7][17][8][9][10][11][18][12][13][14][15][16][19][20]Our

Context consistency analysis
Conflicting rule reasoning
Context-awareness
Formal representation
Holistic
Considers security requirements