Research Article
On the Modelling of Context-Aware Security for Mobile Devices
| | [6] | [7] | [17] | [8] | [9] | [10] | [11] | [18] | [12] | [13] | [14] | [15] | [16] | [19] | [20] | Our |
| Context consistency analysis | — | — | — | — | — | — | — | — | — | ✓ | — | — | ✓ | — | — | ✓ | Conflicting rule reasoning | — | — | — | — | — | ✓ | — | — | — | ✓ | — | — | ✓ | ✓ | ✓ | ✓ | Context-awareness | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Formal representation | — | — | — | — | ✓ | ✓ | — | — | ✓ | — | ✓ | ✓ | ✓ | — | ✓ | ✓ | Holistic | ✓ | ✓ | ✓ | ✓ | — | — | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Considers security requirements | ✓ | ✓ | — | — | ✓ | ✓ | — | ✓ | — | — | — | — | — | ✓ | — | ✓ |
|
|