Research Article

Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection

Table 1

Description of symbols used in ABAC submodel.

SymbolDescription

RRequest operation
Cntxt-infoContextual information (user identity)
Pre_Con_LA list of attributes and conditions that must be true to approve a request
Mid_Con_LA list of attributes and conditions that must be true between receiving a request and processing it
Post_Con_LA list of attributes and conditions that must be true after processing a request. It is used to activate postexecution actions
Result_Con_LAttributes and conditions modified according to the request result
Authorization_statusEvaluation status of the conditions; the request decision (Yes: authorization granted, No: not granted)
Post_ authorization _statusEvaluation status of the postconditions (Yes: granted, No: not granted, X: uncertain)