Scott D. Stoller
Stony Brook University, USA
Email: stoller@cs.stonybrook.edu
Omar Chowdhury
Stony Brook University, USA
Email: omar@cs.stonybrook.edu
Access control has long been one of the most widely adopted and foundational security technologies. It has been seamlessly integrated into operating systems like Multics and Unix—pioneering platforms that contributed to Turing Award-winning innovations—and continues to underpin security in modern mobile devices and cloud computing. Its efficiency and effectiveness have stood the test of time. However, the landscape of computing has dramatically changed since the inception of the ACM Symposium on Access Control Models and Technologies (SACMAT) conference in 1994. We now operate in a deeply interconnected, networked world where no single application or device can act as a fully trusted reference monitor to enforce access control in isolation. This shift demands new trust models, management strategies, enforcement techniques, and supporting mechanisms, such as advanced authentication. In response, SACMAT invites researchers to explore and propose innovative, efficient, and effective security mechanisms designed for distributed, networked computing environments.