Conference Information
SACMAT 2024: ACM Symposium on Access Control Models and Technologies
https://www.sacmat.org/2024/Submission Date: |
2024-02-05 |
Notification Date: |
2024-03-25 |
Conference Date: |
2024-05-15 |
Location: |
San Antonio, Texas, USA |
Years: |
29 |
CCF: c CORE: c QUALIS: a1 Viewed: 32158 Tracked: 68 Attend: 10
Call For Papers
List of Topics Submissions covering any relevant area of access control are welcomed. Areas include, but are not limited to, the following: Authentication: Biometric-based Authentication Identity management Location-based Authentication Password-based Authentication Usable authentication Data Security: Big data Data leakage prevention Data protection on untrusted infrastructure Databases and data management Mechanisms: AI/ML Technologies Blockchain Technologies Cryptographic Technologies Economic models and game theory Hardware-security Technologies (e.g., Intel SGX, ARM TrustZone) Programming-language based Technologies Trust Management Usable mechanisms Network: Corporate and Military-grade Networks Network systems (e.g., Software-defined network, Network function virtualization) Opportunistic Network (e.g., delay-tolerant network, P2P) Overlay Network Satellite Network Wireless and Cellular Networks Policies and Models: Analysis of Models Analysis of policy languages Efficient enforcement of policies Extension of Models Extension of policy languages New Access Control Models Novel policy language design Policy engineering and policy mining Usable access control policy Verification of policy languages Privacy and Privacy-enhancing Technologies: Access control and identity management with privacy Anonymous communication and censorship resistance Anonymous protocols (e.g., Tor) Attacks on Privacy and their defenses Cryptographic tools for privacy Data protection technologies Mixers and Mixnets Online social networks (OSN) Systems: Autonomous systems (e.g., UAV security, autonomous vehicles, etc) Cloud systems and their security Cyber-physical and Embedded systems Design for resiliency Designing systems with zero-trust architectures Distributed systems Fog and Edge-computing systems IoT systems (e.g., home-automation systems) Mobile systems Operating systems WWW
Last updated by Dou Sun in 2024-01-08
Acceptance Ratio
Year | Submitted | Accepted | Accepted(%) |
---|---|---|---|
2005 | 90 | 19 | 21.1% |
2004 | 65 | 18 | 27.7% |
2003 | 63 | 23 | 36.5% |
2002 | 53 | 17 | 32.1% |
Best Papers
Related Conferences
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
b | Empirical Software Engineering | 3.500 | Springer | 1382-3256 |
Journal of Organizational Computing and Electronic Commerce | 2.000 | Taylor & Francis | 1091-9392 | |
Journal of Decision Systems | Taylor & Francis | 1246-0125 | ||
IT Professional | 2.200 | IEEE | 1520-9202 | |
International Journal of Differential Equations | 1.400 | Hindawi | 1687-9643 | |
Cybernetics and Systems Analysis | 0.500 | Springer | 1060-0396 | |
IEEE Computational Intelligence Magazine | 10.30 | IEEE | 1556-603X | |
International Journal of Computer Science, Engineering and Information Technology | AIRCC | 2231-3605 | ||
Algorithms for Molecular Biology | 1.500 | Springer | 1748-7188 | |
IET Computers and Digital Techniques | 0.484 | IET | 1751-8601 |
Full Name | Impact Factor | Publisher |
---|---|---|
Empirical Software Engineering | 3.500 | Springer |
Journal of Organizational Computing and Electronic Commerce | 2.000 | Taylor & Francis |
Journal of Decision Systems | Taylor & Francis | |
IT Professional | 2.200 | IEEE |
International Journal of Differential Equations | 1.400 | Hindawi |
Cybernetics and Systems Analysis | 0.500 | Springer |
IEEE Computational Intelligence Magazine | 10.30 | IEEE |
International Journal of Computer Science, Engineering and Information Technology | AIRCC | |
Algorithms for Molecular Biology | 1.500 | Springer |
IET Computers and Digital Techniques | 0.484 | IET |
Recommendation