Información de la conferencia
SACMAT 2025: ACM Symposium on Access Control Models and Technologies
https://sacmat.org/2025/index.phpDía de Entrega: |
2025-03-24 |
Fecha de Notificación: |
2025-04-28 |
Fecha de Conferencia: |
2025-07-08 |
Ubicación: |
Stony Brook, New York, USA |
Años: |
30 |
CCF: c CORE: c QUALIS: a1 Vistas: 37046 Seguidores: 69 Asistentes: 10
Solicitud de Artículos
Access control has long been one of the most widely adopted and foundational security technologies. It has been seamlessly integrated into operating systems like Multics and Unix—pioneering platforms that contributed to Turing Award-winning innovations—and continues to underpin security in modern mobile devices and cloud computing. Its efficiency and effectiveness have stood the test of time. However, the landscape of computing has dramatically changed since the inception of the ACM Symposium on Access Control Models and Technologies (SACMAT) conference in 1994. We now operate in a deeply interconnected, networked world where no single application or device can act as a fully trusted reference monitor to enforce access control in isolation. This shift demands new trust models, management strategies, enforcement techniques, and supporting mechanisms, such as advanced authentication. In response, SACMAT invites researchers to explore and propose innovative, efficient, and effective security mechanisms designed for distributed, networked computing environments. Topics of Interest The 30th ACM Symposium on Access Control Models and Technologies (SACMAT) invites submissions presenting novel contributions in efficient and effective security mechanisms for distributed, networked computing environments. Topics of interest include, but are not limited to: Authorization Models and Policies Analysis of Policy and Policy Models Policy Enforcement Policy Model and Language Design Policy Maintenance, Migration, and Mining Policy Verification Mechanisms AI/ML Techniques Authentication Cryptographic Techniques Economic Models and Game Theory Hardware Security Techniques (e.g., Intel SGX) Programming Language-based Techniques Zero Trust Architecture Data Big Data Data Leakage Prevention Data Privacy Data Protection Usage Control Systems Cloud, Edge, and Fog Computing Cyber Physical Systems Design for Resiliency Distributed Systems Embedded Systems IoT Systems (e.g., Home Automation) ML-driven, Autonomous Systems (e.g., AI chatbots) Networks (including Wireless and Satellite) Operating Systems Physical Access Control Web Systems Usability and Ethics
Última Actualización Por Dou Sun en 2025-03-08
Coeficiente de Aceptación
Año | Enviados | Aceptados | Aceptados(%) |
---|---|---|---|
2005 | 90 | 19 | 21.1% |
2004 | 65 | 18 | 27.7% |
2003 | 63 | 23 | 36.5% |
2002 | 53 | 17 | 32.1% |
Los Mejores Artículos
Conferencias Relacionadas
Abreviación | Nombre Completo | Conferencia |
---|---|---|
COSITE | International Conference on Computer System, Information Technology, and Electrical Engineering | 2021-10-20 |
EESPE | IEEE International Conference on Electronics, Energy Systems and Power Engineering | 2025-03-17 |
ECKM | European Conference on Knowledge Management | 2020-09-03 |
ADHOCNETS | EAI International Conference on Ad Hoc Networks | 2021-12-06 |
MRA | Asia Conference on Materials Research and Applications | 2018-11-23 |
MEVE | International Conference on Mechanical Engineering and Vehicle Engineering | 2024-09-20 |
ICICTA | International Conference on Intelligent Computation Technology and Automation | 2020-10-24 |
WIAMIS | International Workshop on Image and Audio Analysis for Multimedia Interactive Services | 2013-07-03 |
SAT | International Conference on Theory and Applications of Satisfiability Testing | 2025-08-11 |
CSEE' | International Conference on Computer Science, Engineering, and Education | 2025-02-21 |
Revistas Relacionadas
CCF | Nombre Completo | Factor de Impacto | Editor | ISSN |
---|---|---|---|---|
b | Automated Software Engineering | 2.000 | Springer | 0928-8910 |
c | Journal of Global Information Technology Management | 3.000 | Taylor & Francis | 1097-198X |
Journal of Combinatorial Theory, Series B | 1.200 | Elsevier | 0095-8956 | |
IET Circuits, Devices & Systems | 1.000 | IET | 1751-858X | |
International Journal of Analysis | Hindawi | 2314-498X | ||
IEEE Transactions on Energy Markets, Policy and Regulation | IEEE | 2771-9626 | ||
Cryptography and Communications | 1.200 | Springer | 1936-2447 | |
c | Wireless Networks | 2.100 | Springer | 1022-0038 |
International Journal of Computer Science, Engineering and Information Technology | AIRCC | 2231-3605 | ||
c | Future Generation Computer Systems | 6.2 | Elsevier | 0167-739X |
Nombre Completo | Factor de Impacto | Editor |
---|---|---|
Automated Software Engineering | 2.000 | Springer |
Journal of Global Information Technology Management | 3.000 | Taylor & Francis |
Journal of Combinatorial Theory, Series B | 1.200 | Elsevier |
IET Circuits, Devices & Systems | 1.000 | IET |
International Journal of Analysis | Hindawi | |
IEEE Transactions on Energy Markets, Policy and Regulation | IEEE | |
Cryptography and Communications | 1.200 | Springer |
Wireless Networks | 2.100 | Springer |
International Journal of Computer Science, Engineering and Information Technology | AIRCC | |
Future Generation Computer Systems | 6.2 | Elsevier |