Research Article
On the Modelling of Context-Aware Security for Mobile Devices
Table 2
The list of main security attributes.
| | Integrity | Prevention against improper information modification | | Confidentiality | Guarantee of only authorized information access and disclosure | | Authentication | This is the process of verifying or testing that the claimed identity is valid | | Authorization | Ensures that the requested activity or object access is possible given the rights and privileges assigned to the authenticated identity | | Accountability | Steps of protocols (access to services) are registered to restore past threats | | Availability | Ensuring timely and reliable access to services and data and use of information |
|
|