Research Article

A Probabilistic Privacy Preserving Strategy for Word-of-Mouth Social Networks

Algorithm 2

Rating scheme.
Input: Publisher’s weighted social graph;
Output: Publishing rules;
Phase I: The publisher classifies the sensitivity of the message;
Let I be the message that user want to be published;
(3);
Execute sensitivity classification after each publishing.
Phase II: Divide the secure level of the recipient;
Let be the recipient;
.
Phase III: Determine whether to share message with or not;
if    then
Return: Message can be sent to recipient ;
else
Return: Message can not be sent to recipient ;
end