Next Article in Journal
A Low-Cost Validated Two-Camera 3D Videogrammetry System Applicable to Kinematic Analysis of Human Motion
Previous Article in Journal
Indoor Positioning Systems as Critical Infrastructure: An Assessment for Enhanced Location-Based Services
Previous Article in Special Issue
Post-Quantum Linkable Hash-Based Ring Signature Scheme for Off-Chain Payments in IoT
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Formalizing Permission to Delegate and Delegation with Policy Interaction

by
Azan Hamad Alkhorem
1,
Daniel Conte de Leon
2,
Ananth A. Jillepalli
3,* and
Jia Song
2
1
Department of Computer Engineering, College of Computer Science and Information Technology, Majmaah University, Al Majmaah 11952, Saudi Arabia
2
Department of Computer Science, University of Idaho, Moscow, ID 83844, USA
3
College of Electrical Engineering and Computer Science, Washington State University, Pullman, WA 99164, USA
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(16), 4915; https://doi.org/10.3390/s25164915
Submission received: 20 June 2025 / Revised: 5 August 2025 / Accepted: 5 August 2025 / Published: 8 August 2025

Abstract

In the context of Internet of Things (IoT) intelligent systems, the latest research regarding delegation using an access control model has gained attention, reflecting the need for models to support more functionalities in relation to hierarchical delegation. With respect to delegation procedures within access control, issues arise after delegation concerning the permissions to others with respect to revocation. Redundancy and conflict arising from delegation can occur depending on the delegation policies used within the hierarchical structure. This article discusses implementation of positive delegation represented by “YES” and negative delegation represented by “NO”. Furthermore, we also consider permission to delegate positively and negatively represented by (YES and NO). These challenges are addressed by creating additional features in a hierarchical policy model (HPol). The implementation was created using Python (ver. 3.10) code to verify the advantages of the approach, through experimentation under different scenarios. The model also has the capability to manage and adapt features of the Internet of Things (IoT) to a blockchain architecture, enhancing security and verification during the delegation process and increasing the scalability of Internet of Things (IoT) intelligent environment systems.
Keywords: access control models; permission; permission to delegate; delegation; redundant; conflict detection access control models; permission; permission to delegate; delegation; redundant; conflict detection

Share and Cite

MDPI and ACS Style

Alkhorem, A.H.; Conte de Leon, D.; Jillepalli, A.A.; Song, J. Formalizing Permission to Delegate and Delegation with Policy Interaction. Sensors 2025, 25, 4915. https://doi.org/10.3390/s25164915

AMA Style

Alkhorem AH, Conte de Leon D, Jillepalli AA, Song J. Formalizing Permission to Delegate and Delegation with Policy Interaction. Sensors. 2025; 25(16):4915. https://doi.org/10.3390/s25164915

Chicago/Turabian Style

Alkhorem, Azan Hamad, Daniel Conte de Leon, Ananth A. Jillepalli, and Jia Song. 2025. "Formalizing Permission to Delegate and Delegation with Policy Interaction" Sensors 25, no. 16: 4915. https://doi.org/10.3390/s25164915

APA Style

Alkhorem, A. H., Conte de Leon, D., Jillepalli, A. A., & Song, J. (2025). Formalizing Permission to Delegate and Delegation with Policy Interaction. Sensors, 25(16), 4915. https://doi.org/10.3390/s25164915

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop