Información de la conferencia
SACMAT 2024: ACM Symposium on Access Control Models and Technologies
https://www.sacmat.org/2024/Día de Entrega: |
2024-02-05 |
Fecha de Notificación: |
2024-03-25 |
Fecha de Conferencia: |
2024-05-15 |
Ubicación: |
San Antonio, Texas, USA |
Años: |
29 |
CCF: c CORE: c QUALIS: a1 Vistas: 31476 Seguidores: 68 Asistentes: 10
Solicitud de Artículos
List of Topics Submissions covering any relevant area of access control are welcomed. Areas include, but are not limited to, the following: Authentication: Biometric-based Authentication Identity management Location-based Authentication Password-based Authentication Usable authentication Data Security: Big data Data leakage prevention Data protection on untrusted infrastructure Databases and data management Mechanisms: AI/ML Technologies Blockchain Technologies Cryptographic Technologies Economic models and game theory Hardware-security Technologies (e.g., Intel SGX, ARM TrustZone) Programming-language based Technologies Trust Management Usable mechanisms Network: Corporate and Military-grade Networks Network systems (e.g., Software-defined network, Network function virtualization) Opportunistic Network (e.g., delay-tolerant network, P2P) Overlay Network Satellite Network Wireless and Cellular Networks Policies and Models: Analysis of Models Analysis of policy languages Efficient enforcement of policies Extension of Models Extension of policy languages New Access Control Models Novel policy language design Policy engineering and policy mining Usable access control policy Verification of policy languages Privacy and Privacy-enhancing Technologies: Access control and identity management with privacy Anonymous communication and censorship resistance Anonymous protocols (e.g., Tor) Attacks on Privacy and their defenses Cryptographic tools for privacy Data protection technologies Mixers and Mixnets Online social networks (OSN) Systems: Autonomous systems (e.g., UAV security, autonomous vehicles, etc) Cloud systems and their security Cyber-physical and Embedded systems Design for resiliency Designing systems with zero-trust architectures Distributed systems Fog and Edge-computing systems IoT systems (e.g., home-automation systems) Mobile systems Operating systems WWW
Última Actualización Por Dou Sun en 2024-01-08
Coeficiente de Aceptación
Año | Enviados | Aceptados | Aceptados(%) |
---|---|---|---|
2005 | 90 | 19 | 21.1% |
2004 | 65 | 18 | 27.7% |
2003 | 63 | 23 | 36.5% |
2002 | 53 | 17 | 32.1% |
Los Mejores Artículos
Conferencias Relacionadas
Revistas Relacionadas
CCF | Nombre Completo | Factor de Impacto | Editor | ISSN |
---|---|---|---|---|
b | Empirical Software Engineering | 3.500 | Springer | 1382-3256 |
Journal of Organizational Computing and Electronic Commerce | 2.000 | Taylor & Francis | 1091-9392 | |
Journal of Decision Systems | Taylor & Francis | 1246-0125 | ||
IT Professional | 2.200 | IEEE | 1520-9202 | |
International Journal of Differential Equations | 1.400 | Hindawi | 1687-9643 | |
Cybernetics and Systems Analysis | 0.500 | Springer | 1060-0396 | |
IEEE Computational Intelligence Magazine | 10.30 | IEEE | 1556-603X | |
International Journal of Computer Science, Engineering and Information Technology | AIRCC | 2231-3605 | ||
Algorithms for Molecular Biology | 1.500 | Springer | 1748-7188 | |
IET Computers and Digital Techniques | 0.484 | IET | 1751-8601 |
Nombre Completo | Factor de Impacto | Editor |
---|---|---|
Empirical Software Engineering | 3.500 | Springer |
Journal of Organizational Computing and Electronic Commerce | 2.000 | Taylor & Francis |
Journal of Decision Systems | Taylor & Francis | |
IT Professional | 2.200 | IEEE |
International Journal of Differential Equations | 1.400 | Hindawi |
Cybernetics and Systems Analysis | 0.500 | Springer |
IEEE Computational Intelligence Magazine | 10.30 | IEEE |
International Journal of Computer Science, Engineering and Information Technology | AIRCC | |
Algorithms for Molecular Biology | 1.500 | Springer |
IET Computers and Digital Techniques | 0.484 | IET |
Recomendaciones