Research Article
On the Modelling of Context-Aware Security for Mobile Devices
| | | [6] | [7] | [17] | [8] | [9] | [10] | [11] | [18] | [12] | [13] | [14] | [15] | [16] | [19] | [20] | Our |
| | Context consistency analysis | — | — | — | — | — | — | — | — | — | ✓ | — | — | ✓ | — | — | ✓ | | Conflicting rule reasoning | — | — | — | — | — | ✓ | — | — | — | ✓ | — | — | ✓ | ✓ | ✓ | ✓ | | Context-awareness | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | | Formal representation | — | — | — | — | ✓ | ✓ | — | — | ✓ | — | ✓ | ✓ | ✓ | — | ✓ | ✓ | | Holistic | ✓ | ✓ | ✓ | ✓ | — | — | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | | Considers security requirements | ✓ | ✓ | — | — | ✓ | ✓ | — | ✓ | — | — | — | — | — | ✓ | — | ✓ |
|
|