Conference Information
SACMAT 2022: ACM Symposium on Access Control Models and Technologies
Submission Date:
Notification Date:
Conference Date:
New York City, USA
CCF: c   CORE: c   QUALIS: a1   Viewed: 24389   Tracked: 66   Attend: 8

Call For Papers
Papers offering novel research contributions are solicited for submission. Accepted papers will be presented at the symposium and published by the ACM in the symposium proceedings. In addition to the regular research track, this year SACMAT will again host the special track -- "Blue Sky/Vision Track". Researchers are invited to submit papers describing promising new ideas and challenges of interest to the community as well as access control needs emerging from other fields. We are particularly looking for potentially disruptive and new ideas which can shape the research agenda for the next 10 years. We also encourage submissions to the "Work-in-progress Track" to present ideas that may have not been completely developed and experimentally evaluated.

Topics of Interest

    Submissions to the regular track covering any relevant area of access control are welcomed. Areas include, but are not limited to, the following:

        Operating systems
        Cloud systems and their security
        Distributed systems
        Fog and Edge-computing systems
        Cyber-physical and Embedded systems
        Mobile systems
        Autonomous systems (e.g., UAV security, autonomous vehicles, etc)
        IoT systems (e.g., home-automation systems)
        Design for resiliency
        Designing systems with zero-trust architectures 
        Network systems (e.g., Software-defined network, Network function virtualization)
        Corporate and Military-grade Networks
        Wireless and Cellular Networks
        Opportunistic Network (e.g., delay-tolerant network, P2P)
        Overlay Network
        Satellite Network 
    Privacy and Privacy-enhancing Technologies:
        Mixers and Mixnets
        Anonymous protocols (e.g., Tor)
        Online social networks (OSN)
        Anonymous communication and censorship resistance
        Access control and identity management with privacy
        Cryptographic tools for privacy
        Data protection technologies
        Attacks on Privacy and their defenses 
        Password-based Authentication
        Biometric-based Authentication
        Location-based Authentication
        Identity management
        Usable authentication 
        Blockchain Technologies
        AI/ML Technologies
        Cryptographic Technologies
        Programming-language based Technologies
        Hardware-security Technologies (e.g., Intel SGX, ARM TrustZone)
        Economic models and game theory
        Trust Management
        Usable mechanisms 
    Data Security:
        Big data
        Databases and data management
        Data leakage prevention
        Data protection on untrusted infrastructure 
    Policies and Models:
        Novel policy language design
        New Access Control Models
        Extension of policy languages
        Extension of Models
        Analysis of policy languages
        Analysis of Models
        Policy engineering and policy mining
        Verification of policy languages
        Efficient enforcement of policies
        Usable access control policy 
Last updated by Dou Sun in 2022-01-26
Acceptance Ratio
Related Conferences
Related Journals
CCFFull NameImpact FactorPublisherISSN
Physics of Life Reviews11.02Elsevier1571-0645
Microsystem Technologies2.276Springer0946-7076
International Journal of Differential EquationsHindawi1687-9643
Computational Social NetworksSpringer2197-4314
IEEE Transactions on Learning Technologies2.315IEEE1939-1382
bACM Transactions on Reconfigurable Technology and Systems1.409ACM1936-7406
Discrete Event Dynamic Systems0.976Springer0924-6703
Journal of Internet Technology0.481Taiwan Academic Network1607-9264
bACM Transactions on Internet Technology1.489ACM1533-5399
Artificial Life and Robotics Springer1433-5298