Research Article
Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection
Table 1
Description of symbols used in ABAC submodel.
| Symbol | Description |
| R | Request operation | Cntxt-info | Contextual information (user identity) | Pre_Con_L | A list of attributes and conditions that must be true to approve a request | Mid_Con_L | A list of attributes and conditions that must be true between receiving a request and processing it | Post_Con_L | A list of attributes and conditions that must be true after processing a request. It is used to activate postexecution actions | Result_Con_L | Attributes and conditions modified according to the request result | Authorization_status | Evaluation status of the conditions; the request decision (Yes: authorization granted, No: not granted) | Post_ authorization _status | Evaluation status of the postconditions (Yes: granted, No: not granted, X: uncertain) |
|
|