Conference Information
SACMAT 2025: ACM Symposium on Access Control Models and Technologies
https://sacmat.org/2025/index.php
Submission Date:
2025-03-24
Notification Date:
2025-04-28
Conference Date:
2025-07-08
Location:
Stony Brook, New York, USA
Years:
30
CCF: c   CORE: c   QUALIS: a1   Viewed: 32923   Tracked: 68   Attend: 10

Call For Papers
Access control has long been one of the most widely adopted and foundational security technologies. It has been seamlessly integrated into operating systems like Multics and Unix—pioneering platforms that contributed to Turing Award-winning innovations—and continues to underpin security in modern mobile devices and cloud computing. Its efficiency and effectiveness have stood the test of time. However, the landscape of computing has dramatically changed since the inception of the ACM Symposium on Access Control Models and Technologies (SACMAT) conference in 1994. We now operate in a deeply interconnected, networked world where no single application or device can act as a fully trusted reference monitor to enforce access control in isolation. This shift demands new trust models, management strategies, enforcement techniques, and supporting mechanisms, such as advanced authentication. In response, SACMAT invites researchers to explore and propose innovative, efficient, and effective security mechanisms designed for distributed, networked computing environments.

Topics of Interest

The 30th ACM Symposium on Access Control Models and Technologies (SACMAT) invites submissions presenting novel contributions in efficient and effective security mechanisms for distributed, networked computing environments. Topics of interest include, but are not limited to:

Authorization Models and Policies

    Analysis of Policy and Policy Models
    Policy Enforcement
    Policy Model and Language Design
    Policy Maintenance, Migration, and Mining
    Policy Verification

Mechanisms

    AI/ML Techniques
    Authentication
    Cryptographic Techniques
    Economic Models and Game Theory
    Hardware Security Techniques (e.g., Intel SGX)
    Programming Language-based Techniques
    Zero Trust Architecture

Data

    Big Data
    Data Leakage Prevention
    Data Privacy
    Data Protection
    Usage Control

Systems

    Cloud, Edge, and Fog Computing
    Cyber Physical Systems
    Design for Resiliency
    Distributed Systems
    Embedded Systems
    IoT Systems (e.g., Home Automation)
    ML-driven, Autonomous Systems (e.g., AI chatbots)
    Networks (including Wireless and Satellite)
    Operating Systems
    Physical Access Control
    Web Systems

Usability and Ethics
Last updated by Dou Sun in 2025-03-08
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
2005901921.1%
2004651827.7%
2003632336.5%
2002531732.1%
Related Conferences
Recommendation