Skip to main content
Log in

A formalized delegation model for multimedia social networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In response to the issues of second-hand sharing and repeat delegation of the digital content in existing multimedia social networks, this paper proposed a novel formalized delegation model for multimedia social network. In accordance with this model, delegators can independently lay down delegation policies. Further, related delegation constraints and strategies were identified to solve delegation conflicts. When a conflict arises among several delegations, strategies could be used to solve the conflict. This delegation model can control the authorities and are delegated consistently until the authorization expires or is revoked. And also, the paper presented essential security policies that lead to revoking different authorities. A use case of real multimedia social network further verified the efficiency and effectiveness of the proposed model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Donick M, Schonfeldt C, Thomanek A, et al. (2011) A model for assessing the degree of formalization and support of learning scenarios[C]//. Int Conf Interact Collab Learn:290–295

  2. Feng W, Zhang Z, Wang J et al (2015) A novel authorization delegation for multimedia social networks by using proxy re-encryption. Multimed Tools Appl. doi:10.1007/s11042-015-2929-2

    Google Scholar 

  3. Gomi H (2011) Access control model and design for delegation using authorization tokens.[C]// Privacy, Security, Risk and Trust (PASSAT) 2011 IEEE Third Int Conf Social Comput (SocialCom), 2011 IEEE Third Int Conf. IEEE:1239–1242

  4. Hur J (2013) Improving security and efficiency in attribute-based data sharing [J]. IEEE Trans Knowl Data Eng 25(10):2271–2282

    Article  Google Scholar 

  5. Hur J, Noh DK (2011) Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Trans Parallel Distrib Syst 22(7):1214–1221

    Article  Google Scholar 

  6. Lei J (2013) Weighted directed graph-based authorization delegation model[J]. J Netw 8(12)

  7. Sun D (2011) UCSSDAP Ubiquitous computing service security delegation authorization protocol. [C]//IEEE Int Conf Autom Logistics, ICAL:371–374

  8. Toahchoodee M, Ray I (2011) On the formalization and analysis of a spatio-temporal role-based access control model [J]. J Comput Secur 19:399–452

    Article  Google Scholar 

  9. Wang F, Zhou L (2009) UCONDFNND - an effective delegation model[C]//. Web Inform Syst Mining, Int Conf. IEEE:557–561

  10. Ye C, Wu Z, Zhong J, et al. (2008) Revocation in an attribute-based delegation model[C]// networking, architecture, and storage, 2008. NAS ’08. Int Conf. IEEE:171–172

  11. Zhang M, Ogata K, Futatsugi K (2013) Formalization and verification of behavioral correctness of dynamic software updates[J]. Electronic Notes Theoret Comput Sci 294:12–23

    Article  Google Scholar 

  12. Zhang Z, Wang K (2015) A formal analytic approach to credible potential path and mining algorithms for multimedia social networks. Comput J 58(4):668–678

    Article  Google Scholar 

  13. Zhang Z, Wang Z, Niu D (2015) A novel approach to rights sharing-enabling digital rights management for mobile multimedia. Multimed Tools Appl 74(16):6255–6271

    Article  Google Scholar 

Download references

Acknowledgments

The work was sponsored by Program for Henan Province Science and Technology Grant No.152102210218. We would like to thank the reviewers and editor for their valuable comments, questions, and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yulei Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, Y., Yang, J., Qiu, G. et al. A formalized delegation model for multimedia social networks. Multimed Tools Appl 76, 3279–3291 (2017). https://doi.org/10.1007/s11042-016-3715-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3715-5

Keywords

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy