Research Article
On the Modelling of Context-Aware Security for Mobile Devices
Table 2
The list of main security attributes.
| Integrity | Prevention against improper information modification | Confidentiality | Guarantee of only authorized information access and disclosure | Authentication | This is the process of verifying or testing that the claimed identity is valid | Authorization | Ensures that the requested activity or object access is possible given the rights and privileges assigned to the authenticated identity | Accountability | Steps of protocols (access to services) are registered to restore past threats | Availability | Ensuring timely and reliable access to services and data and use of information |
|
|