Research Article
Quality of Protection Evaluation of Security Mechanisms
Algorithm 1
Algorithm of security attributes evaluation.
(1) SET | (2) for to do | (3) 0 | (4) SET | (5) SET | (6) | (7) SET | (8) | (9) if then | (10) 0 | (11) CONTINUE | (12) for to do | (13) for to do | (14) if then | (15) EXCLUDE from | (16) end if | (17) end for | (18) end for | (19) end if | (20) | (21) for from do | (22) if exists in such that conclusion is Inf0 | then | (23) 0 | (24) CONTINUE | (25) else | (26) READ | (27) | (28) end if | (29) end for | (30) end for |
|