Research Article
Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment
Table 4
Operation examples for user actions with trust level in OSN environment.
| Access permission level | Operations | Contents of possible threats in OSN | Trust value |
| 0 | | None | 0 | 1 | {read} | Passive recognition of information | (0–0.4) | 2 | {like, dislike} | Passive behavior against information | 0.4–0.6) | 3 | {comment} | Malicious reaction against information | 0.6–0.8) | 4 | {post contents, tag} | Active malicious action in owner’s domain | 0.8-0.9) | 5 | {share} | Active information leaking | 0.9-1) |
|
|