Research Article

Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

Table 4

Operation examples for user actions with trust level in OSN environment.

Access permission levelOperationsContents of possible threats in OSNTrust value

0None0
1{read}Passive recognition of information(0–0.4)
2{like, dislike}Passive behavior against information0.4–0.6)
3{comment}Malicious reaction against information0.6–0.8)
4{post contents, tag}Active malicious action in owner’s domain0.8-0.9)
5{share}Active information leaking0.9-1)