Explore chapters and articles related to this topic
Dignity Stable Analysis Pattern
Published in M. E. Fayad, Stable Analysis Patterns for Software and Systems, 2017
Figure 8.7b shows the use of delegation instead of inheritance. How it affects the modeling pattern is an interesting feature. Delegation provides dynamism, that is, run-time flexibility which is one of the distinct features. The remaining characteristics are similar to inheritance, as it also provides reuse technique. Dynamic coupling between superclass and subclass is the key feature.
Flexible, decentralised access control for smart buildings with smart contracts
Published in Cyber-Physical Systems, 2022
Leepakshi Bindra, Kalvin Eng, Omid Ardakanian, Eleni Stroulia
Conventional methods for authentication, authorisation, and revocation rely on a trusted central authority. For example, the existing authorisation method LDAP [22] uses Role-Based Access Control (RBAC) with a single central authority. Kerberos [23] and Jabber [24] are similar in that respect. Several systems are also developed to eliminate the central authority, examples of which are CCN [25] and the Web of Trust [26,27]. They adopt a decentralised peer-to-peer trust model in which a principal, denoted by a public key, can publish a signature of another public key to denote trust. SmartTokens [28] relies on a token-based access control system for NFC-enabled smartphones, in which the delegation of access to other smartphone users can be accomplished without a central authority. Although SmartTokens uses symmetric cryptography, users need to present all delegated tokens through the delegation chain in order to be verified. In recent work [29], a lightweight distributed authorisation protocol is proposed supporting delegation of access right to a smart device in the form of a Bloom filter. This method of delegation uses secured hashing to prevent the permission from being forged.
The Delegation-Level Choice of an Automated Vehicle: An Analysis by Structural Equation Modeling
Published in International Journal of Human–Computer Interaction, 2023
Marlène Bel, Stéphanie Coeugnet
First, people may project the use of AVs that are similar to technological objects they know, and the higher the delegation level is, the less likely it is that the AV is similar to a known object. A second reason could be that expert drivers find it unacceptable to become novice users of AVs. Indeed, the more automated a vehicle is, the more an experienced driver is essentially a novice. This could explain the undifferentiated choice between Levels C and D: Some people are willing to accept, to some extent, being a novice.
Using Ontologies to Share Access Control Information in Rural Business Process Outsourcing
Published in IETE Journal of Research, 2021
Delegation is a mechanism by which a user can assign a subset of his permissions to another user. The administrator can specify a subset of roles which can delegate their permissions to other roles. To achieve this, we create DelegateRole as a subclass of the Role class. Further, to specify delegation across different roles, we define an object property canDelegate. Thus, canDelegate(r,r1) allows a user in role r to delegate permissions to another user in role r1.