Research Article

A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices

Algorithm 2

Pruning.
Input: - Confidential documents set
- Non-confidential documents set
- Clusters set, each with the centroid and corresponding graph
- The set of context terms
Output: - The updated set of confidential terms in clusters
- The updated set of context terms
(1)
(2) for (each in )
(3) If
(4)
(5) for (each in )
(6) Update confidential terms in CT
(7) Update context terms in