Research Article
On the Modelling of Context-Aware Security for Mobile Devices
Algorithm 2
Algorithm of the security attributes context evaluation: CONTEXT(
).
| () | | () SET | | () | | () | | () for to do | | () for to do | | () if then | | () EXCLUDE from | | () end if | | () end for | | () end for | | () | | () if then | | () ERROR | | () end if | | () SET | | () SET | | () for to do | | () if then | | () | | () end if | | () end for | | () RETURN |
|