Información de la conferencia
SACMAT 2024: ACM Symposium on Access Control Models and Technologies
https://www.sacmat.org/2024/
Día de Entrega:
2024-02-05
Fecha de Notificación:
2024-03-25
Fecha de Conferencia:
2024-05-15
Ubicación:
San Antonio, Texas, USA
Años:
29
CCF: c   CORE: c   QUALIS: a1   Vistas: 31476   Seguidores: 68   Asistentes: 10

Solicitud de Artículos
List of Topics

Submissions covering any relevant area of access control are welcomed. Areas include, but are not limited to, the following:

    Authentication: 
        Biometric-based Authentication
        Identity management
        Location-based Authentication
        Password-based Authentication
        Usable authentication
    Data Security: 
        Big data
        Data leakage prevention
        Data protection on untrusted infrastructure
        Databases and data management
    Mechanisms: 
        AI/ML Technologies
        Blockchain Technologies
        Cryptographic Technologies
        Economic models and game theory
        Hardware-security Technologies (e.g., Intel SGX, ARM TrustZone)
        Programming-language based Technologies
        Trust Management
        Usable mechanisms
    Network: 
        Corporate and Military-grade Networks
        Network systems (e.g., Software-defined network, Network function virtualization)
        Opportunistic Network (e.g., delay-tolerant network, P2P)
        Overlay Network
        Satellite Network
        Wireless and Cellular Networks
    Policies and Models: 
        Analysis of Models
        Analysis of policy languages
        Efficient enforcement of policies
        Extension of Models
        Extension of policy languages
        New Access Control Models
        Novel policy language design
        Policy engineering and policy mining
        Usable access control policy
        Verification of policy languages
    Privacy and Privacy-enhancing Technologies: 
        Access control and identity management with privacy
        Anonymous communication and censorship resistance
        Anonymous protocols (e.g., Tor)
        Attacks on Privacy and their defenses
        Cryptographic tools for privacy
        Data protection technologies
        Mixers and Mixnets
        Online social networks (OSN)
    Systems: 
        Autonomous systems (e.g., UAV security, autonomous vehicles, etc)
        Cloud systems and their security
        Cyber-physical and Embedded systems
        Design for resiliency
        Designing systems with zero-trust architectures
        Distributed systems
        Fog and Edge-computing systems
        IoT systems (e.g., home-automation systems)
        Mobile systems
        Operating systems
        WWW
Última Actualización Por Dou Sun en 2024-01-08
Coeficiente de Aceptación
AñoEnviadosAceptadosAceptados(%)
2005901921.1%
2004651827.7%
2003632336.5%
2002531732.1%
Conferencias Relacionadas
Recomendaciones