posted by system || 12440 views || tracked by 26 users: [display]

SACMAT 2011 : 16th ACM Symposium on Access Control Models and Technologies

FacebookTwitterLinkedInGoogle


Conference Series : Symposium on Access Control Models and Technologies
 
Link: http://www.sacmat.org/
 
When Jun 15, 2011 - Jun 17, 2011
Where Innsbruck, Austria
Abstract Registration Due Jan 7, 2011
Submission Deadline Jan 14, 2011
Notification Due Mar 1, 2011
Final Version Due Mar 22, 2011
Categories    security
 

Call For Papers

Papers offering novel research contributions in all aspects of access control are solicited for submission to the 16th ACM Symposium on Access Control Models and Technologies (SACMAT 2011). Accepted papers will be presented at the symposium and published by the ACM in the symposium proceedings.

Topics of Interest

o Access control models and extensions
o Access control requirements
o Access control design methodology
o Access control mechanisms, systems, and tools
o Access control in distributed and mobile systems
o Access control for innovative applications
o Administration of access control policies
o Delegation
o Identity management
o Policy/Role engineering
o Safety analysis and enforcement
o Standards for access control
o Trust management
o Trust and risk models in access control
o Theoretical foundations for access control models
o Usability in access control systems
o Usage control

Paper Submission and Format

Authors must submit an abstract of their submission at least a week before the deadline for submission of papers (see important dates), in order to expedite the appointment of reviewers.

Abstracts and papers are to be submitted electronically using the EasyChair conference management system (http://www.easychair.org/conferences/?conf=sacmat2011). Papers must be submitted as a single PDF file, formatted for 8.5" X 11" paper, and be no more than 5MB in size. It is the responsibility of the authors to ensure that their submission will print easily on simple default configurations.

Papers must be written in English. Authors are required to use the ACM format for papers, using one of the ACM SIG Proceedings Templates (http://www.acm.org/sigs/pubs/proceed/template.html). The length of the paper (in the proceedings format) must not exceed ten US letter pages, excluding well-marked appendices, and no more than twelve pages in total. Committee members are not required to read the appendices, so papers must be intelligible without them.

The submission must be anonymous, so information that might identify the authors - including author names, affiliations, acknowledgements, or obvious self-citations - must be excluded. It is the authors’ responsibility to ensure that their anonymity is preserved when citing their own work.

All submissions must contain a significant original contribution. That is, submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. In particular, simultaneous submission of the same work is not allowed. Where appropriate, relevant related work, including that of the authors, must be cited.

Related Resources

CEECT-Chongqing, China 2025   2025 7th International Conference on Electrical Engineering and Control Technologies (CEECT 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-CEECT 2025   2025 7th International Conference on Electrical Engineering and Control Technologies (CEECT 2025)
NLAIM 2025   2nd International Conference on NLP, Artificial Intelligence, Machine Learning and Applications
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
MEMOCODE 2025   MEMOCODE'25 23rd ACM-IEEE International Symposium on Formal Methods and Models for System Design
MAD 2025   Call For Papers: 4th ACM International Workshop on Multimedia AI against Disinformation
CRBL 2025   5th International Conference on Cryptography and Blockchain
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
ESORICS 2025   European Symposium on Research in Computer Security (round 2)