Research Article

Quality of Protection Evaluation of Security Mechanisms

Algorithm 1

Algorithm of security attributes evaluation.
(1) SET
(2)  for   to   do
(3)  0
(4)  SET
(5)  SET
(6) 
(7)  SET
(8)
(9)  if     then
(10)   0
(11)  CONTINUE
(12)  for   to   do
(13)   for   to   do
(14)    if     then
(15)     EXCLUDE from
(16)    end if
(17)   end for
(18)  end for
(19) end if
(20)
(21) for   from   do
(22)  if  exists in such that conclusion is Inf0
   then
(23)    0
(24)   CONTINUE
(25)  else
(26)   READ
(27)   
(28)  end if
(29) end for
(30) end for