Conference Information		
	SACMAT 2025: ACM Symposium on Access Control Models and Technologies
https://sacmat.org/2025/index.phpSubmission Date:  | 
    2025-03-24  | 
  
Notification Date:  | 
    2025-04-28  | 
  
Conference Date:  | 
    2025-07-08  | 
  
Location:  | 
    Stony Brook, New York, USA  | 
  
Years:  | 
    30  | 
  
CCF: c   CORE: c   QUALIS: a1   Viewed: 38149   Tracked: 69   Attend: 10
			 Call For Papers		
	Access control has long been one of the most widely adopted and foundational security technologies. It has been seamlessly integrated into operating systems like Multics and Unix—pioneering platforms that contributed to Turing Award-winning innovations—and continues to underpin security in modern mobile devices and cloud computing. Its efficiency and effectiveness have stood the test of time. However, the landscape of computing has dramatically changed since the inception of the ACM Symposium on Access Control Models and Technologies (SACMAT) conference in 1994. We now operate in a deeply interconnected, networked world where no single application or device can act as a fully trusted reference monitor to enforce access control in isolation. This shift demands new trust models, management strategies, enforcement techniques, and supporting mechanisms, such as advanced authentication. In response, SACMAT invites researchers to explore and propose innovative, efficient, and effective security mechanisms designed for distributed, networked computing environments.
Topics of Interest
The 30th ACM Symposium on Access Control Models and Technologies (SACMAT) invites submissions presenting novel contributions in efficient and effective security mechanisms for distributed, networked computing environments. Topics of interest include, but are not limited to:
Authorization Models and Policies
    Analysis of Policy and Policy Models
    Policy Enforcement
    Policy Model and Language Design
    Policy Maintenance, Migration, and Mining
    Policy Verification
Mechanisms
    AI/ML Techniques
    Authentication
    Cryptographic Techniques
    Economic Models and Game Theory
    Hardware Security Techniques (e.g., Intel SGX)
    Programming Language-based Techniques
    Zero Trust Architecture
Data
    Big Data
    Data Leakage Prevention
    Data Privacy
    Data Protection
    Usage Control
Systems
    Cloud, Edge, and Fog Computing
    Cyber Physical Systems
    Design for Resiliency
    Distributed Systems
    Embedded Systems
    IoT Systems (e.g., Home Automation)
    ML-driven, Autonomous Systems (e.g., AI chatbots)
    Networks (including Wireless and Satellite)
    Operating Systems
    Physical Access Control
    Web Systems
Usability and Ethics
	Last updated by Dou Sun in 2025-03-08
	
			 Acceptance Ratio		
	| Year | Submitted | Accepted | Accepted(%) | 
|---|---|---|---|
| 2005 | 90 | 19 | 21.1% | 
| 2004 | 65 | 18 | 27.7% | 
| 2003 | 63 | 23 | 36.5% | 
| 2002 | 53 | 17 | 32.1% | 
			 Best Papers		
	
			 Related Conferences		
	| Short | Full Name | Conference | 
|---|---|---|
| COSITE | International Conference on Computer System, Information Technology, and Electrical Engineering | 2021-10-20 | 
| EESPE | IEEE International Conference on Electronics, Energy Systems and Power Engineering | 2025-03-17 | 
| ECKM | European Conference on Knowledge Management | 2020-09-03 | 
| ADHOCNETS | EAI International Conference on Ad Hoc Networks | 2021-12-06 | 
| MRA | Asia Conference on Materials Research and Applications | 2018-11-23 | 
| MEVE | International Conference on Mechanical Engineering and Vehicle Engineering | 2024-09-20 | 
| ICICTA | International Conference on Intelligent Computation Technology and Automation | 2020-10-24 | 
| WIAMIS | International Workshop on Image and Audio Analysis for Multimedia Interactive Services | 2013-07-03 | 
| SAT | International Conference on Theory and Applications of Satisfiability Testing | 2025-08-11 | 
| CSEE' | International Conference on Computer Science, Engineering, and Education | 2025-02-21 | 
			 Related Journals		
	| CCF | Full Name | Impact Factor | Publisher | ISSN | 
|---|---|---|---|---|
| b | Automated Software Engineering | 2.000 | Springer | 0928-8910 | 
| c | Journal of Global Information Technology Management | 3.000 | Taylor & Francis | 1097-198X | 
| Journal of Combinatorial Theory, Series B | 1.200 | Elsevier | 0095-8956 | |
| IET Circuits, Devices & Systems | 1.000 | IET | 1751-858X | |
| International Journal of Analysis | Hindawi | 2314-498X | ||
| IEEE Transactions on Energy Markets, Policy and Regulation | IEEE | 2771-9626 | ||
| Cryptography and Communications | 1.200 | Springer | 1936-2447 | |
| c | Wireless Networks | 2.100 | Springer | 1022-0038 | 
| International Journal of Computer Science, Engineering and Information Technology | AIRCC | 2231-3605 | ||
| c | Future Generation Computer Systems | 6.2 | Elsevier | 0167-739X | 
| Full Name | Impact Factor | Publisher | 
|---|---|---|
| Automated Software Engineering | 2.000 | Springer | 
| Journal of Global Information Technology Management | 3.000 | Taylor & Francis | 
| Journal of Combinatorial Theory, Series B | 1.200 | Elsevier | 
| IET Circuits, Devices & Systems | 1.000 | IET | 
| International Journal of Analysis | Hindawi | |
| IEEE Transactions on Energy Markets, Policy and Regulation | IEEE | |
| Cryptography and Communications | 1.200 | Springer | 
| Wireless Networks | 2.100 | Springer | 
| International Journal of Computer Science, Engineering and Information Technology | AIRCC | |
| Future Generation Computer Systems | 6.2 | Elsevier |