Contact

General Chairs

Scott D. Stoller
Stony Brook University, USA
Email: stoller@cs.stonybrook.edu
Omar Chowdhury
Stony Brook University, USA
Email: omar@cs.stonybrook.edu

Find us on Social Media

Symposium on Access Control Models and Technologies

Call for Papers


Access control has long been one of the most widely adopted and foundational security technologies. It has been seamlessly integrated into operating systems like Multics and Unix—pioneering platforms that contributed to Turing Award-winning innovations—and continues to underpin security in modern mobile devices and cloud computing. Its efficiency and effectiveness have stood the test of time. However, the landscape of computing has dramatically changed since the inception of the ACM Symposium on Access Control Models and Technologies (SACMAT) conference in 1994. We now operate in a deeply interconnected, networked world where no single application or device can act as a fully trusted reference monitor to enforce access control in isolation. This shift demands new trust models, management strategies, enforcement techniques, and supporting mechanisms, such as advanced authentication. In response, SACMAT invites researchers to explore and propose innovative, efficient, and effective security mechanisms designed for distributed, networked computing environments.

Topics of Interest

The 30th ACM Symposium on Access Control Models and Technologies (SACMAT) invites submissions presenting novel contributions in efficient and effective security mechanisms for distributed, networked computing environments. Topics of interest include, but are not limited to:

Authorization Models and Policies

  • Analysis of Policy and Policy Models
  • Policy Enforcement
  • Policy Model and Language Design
  • Policy Maintenance, Migration, and Mining
  • Policy Verification

Mechanisms

  • AI/ML Techniques
  • Authentication
  • Cryptographic Techniques
  • Economic Models and Game Theory
  • Hardware Security Techniques (e.g., Intel SGX)
  • Programming Language-based Techniques
  • Zero Trust Architecture

Data

  • Big Data
  • Data Leakage Prevention
  • Data Privacy
  • Data Protection
  • Usage Control

Systems

  • Cloud, Edge, and Fog Computing
  • Cyber Physical Systems
  • Design for Resiliency
  • Distributed Systems
  • Embedded Systems
  • IoT Systems (e.g., Home Automation)
  • ML-driven, Autonomous Systems (e.g., AI chatbots)
  • Networks (including Wireless and Satellite)
  • Operating Systems
  • Physical Access Control
  • Web Systems

Usability and Ethics

Paper Submission

Submissions must be in PDF format using ACM’s double-column "sigconf" template(see https://www.acm.org/publications/authors/submissions), and no more than 10 pages long, excluding up to 2 pages of bibliography and well-marked appendices. Note that reviewers are not required to read the appendices.

In addition to the Main Research Track, we invite authors to consider the following special tracks.

  • BlueSky (up to 8 pages): Papers that present visionary ideas, long-term challenges, and research opportunities that are outside of the current mainstream topics in the field.
  • Dataset/Tool (up to 5 pages): Papers that present a novel curated dataset, a novel synthetic dataset generation process, or the design and implementation of a novel tool incorporating previously proposed research and technologies. The papers must clearly discuss the audience benefiting from them (e.g., researchers/practitioners) and evaluate their contributions using experiments or case studies.
  • Systematization of Knowledge (up to 12 pages): Papers that evaluate, systematize, and contextualize existing knowledge in a relevant area to our community. While papers that present a convincing, comprehensive new taxonomy of such an area are welcomed, survey papers without such insights are not appropriate and may be rejected without full review.
  • Work in Progress (up to 5 pages): Papers that present early-stage research problems and results that might not be fully developed. This track is ideal for early-stage graduate students to obtain early, constructive feedback on their work.

Submissions to the above tracks must include subtitle “[TrackName Paper]” in the PDF file (e.g., using \subtitle{[BlueSky Paper]} in LaTeX). In addition to the page limits stated above, the papers may include a bibliography and appendices of no more than 2 pages for BlueSky and Systematization of Knowledge papers, and 1 page for others.

All submissions must be anonymous; information that might identify the authors, including author names, affiliations, acknowledgements, or obvious self-citations, must be excluded. It is the authors' responsibility to ensure that their anonymity is preserved when citing their own work.

All submissions must contain a significant original contribution. They must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference, or workshop. Wherever appropriate, relevant related work, including that of the authors, must be cited.

Submissions that are not accepted as full papers may be invited to appear as Work in Progress papers. At least one author from each accepted paper must register (with a full registration) for the conference prior to the camera-ready deadline and is expected to present it in person at the conference (remote presentations are possible only in exceptional cases, e.g., a last-minute positive COVID case).

Submission Site: https://sacmat2025.hotcrp.com/

Important Dates

Abstract Submission Deadline March 24, 2025
Paper Submission Deadline March 24, 2025
Author Notification April 28, 2025
Conference Dates July 8 - 10, 2025

ACM Publication Policies

By submitting your article to an ACM Publication, you are hereby acknowledging that you and your co-authors are subject to all ACM Publications Policies, including ACM's new Publications Policy on Research Involving Human Participants and Subjects. Alleged violations of this policy or any ACM Publications Policy will be investigated by ACM and may result in a full retraction of your paper, in addition to other potential penalties, as per ACM Publications Policy.

Please ensure that you and your co-authors obtain an ORCID ID, so you can complete the publishing process for your accepted paper. ACM has been involved in ORCID from the start and we have recently made a commitment to collect ORCID IDs from all of our published authors. We are committed to improve author discoverability, ensure proper attribution and contribute to ongoing community efforts around name normalization; your ORCID ID will help in these efforts.