Research Article
On the Modelling of Context-Aware Security for Mobile Devices
Algorithm 1
Security attributes adaptation algorithm.
| ) SET | | () SET | | () | | () SET | | () | | () SET | | () | | () if then | | () | | () | | () end if | | () if then | | () do | | () foreach in do | | () if then | | () | | () | | () end if | | () | | () | | () | | () | | () if then | | () | | () end if | | () while () | | () end if | | () if then | | () | | () end if |
|