It is our great pleasure to welcome you to the 29th ACM Symposium on Access Control Models and Technologies (SACMAT 2024). This year's symposium continues its tradition of being the premier venue for presenting research results and experience reports on cutting edge advances on access control, including models, systems, applications, and theory, while also embracing an expanded focus on the general area of computer and information security and privacy. The overarching goal of the symposium is to share novel access control and computer security solutions that fulfill the needs of emerging applications and environments, and also to identify new directions for future research and development. ACM SACMAT provides researchers and also practitioners with a unique opportunity to share their perspectives with others interested in the various aspects of access control and computer security.
Proceeding Downloads
AI/ML, Graphs and Access Control: Towards Holistic Identity and Access Management
Vulnerabilities in identity and access management (IAM) are one of the most common reasons for data breaches leading to adversarial impacts on security, privacy and compliance postures. Account breaches, incorrectly designed access control policies, ...
Cryptographic Enforcement of Access Control Policies: Models, Applications, and Future Directions
Cryptographic enforcement of access control policies is a rapidly evolving field with ongoing research and development aimed at addressing emerging security challenges and requirements.
Among the different techniques to cryptographically enforce access ...
Trustworthy Artificial Intelligence for Securing Transportation Systems
Artificial Intelligence (AI) techniques are being applied to numerous applications from Healthcare to Cyber Security to Finance. For example, Machine Learning (ML) algorithms are being applied to solve security problems such as malware analysis and ...
ToneCheck: Unveiling the Impact of Dialects in Privacy Policy
Users frequently struggle to decipher privacy policies, facing challenges due to the legalese often present in privacy policies, leaving trust and comprehension shrouded in ambiguity. This study dives into the transformative power of language, exploring ...
Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning
The popularity of Machine Learning (ML) makes the privacy of sensitive data more imperative than ever. Collaborative learning techniques like Split Learning (SL) aim to protect client data while enhancing ML processes. Though promising, SL has been ...
Making Privacy-preserving Federated Graph Analytics Practical (for Certain Queries)
Privacy-preserving federated graph analytics is an emerging area of research. The goal is to run graph analytics queries over a set of devices that are organized as a graph while keeping the raw data on the devices rather than centralizing it. Further, ...
WiP: Enhancing the Comprehension of XACML Policies
Policy comprehension is crucial for ensuring data protection. Yet, policies written in flexible and expressive languages such as XACML are not easy to comprehend. In this work, we propose a visualization framework to facilitate the comprehension of XACML ...
Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks
Multi-cloud applications have become ubiquitous in today's organizations. Multi-cloud applications are being deployed across cloud service provider platforms to deliver services to all aspects of business. With the expansive use of multi-cloud ...
SecureCheck: User-Centric and Geolocation-Aware Access Mediation Contracts for Sharing Private Data
Data oversharing is a critical issue in today's technologically driven society. Numerous entities, i.e., corporations, governments, criminal groups, are collecting individuals' data. One potential cause is that current systems, such as verification ...
Static and Dynamic Analysis of a Usage Control System
- Ulrich Schöpp,
- Fathiyeh Faghih,
- Subhajit Bandopadhyay,
- Hussein Joumaa,
- Amjad Ibrahim,
- Chuangjie Xu,
- Xin Ye,
- Theo Dimitrakos
The ability to exchange data while maintaining sovereignty is fundamental to emerging decentralized data-driven ecosystems. Data sovereignty refers to the entity's capability to be self-determined concerning data usage. As such, a data usage control ...
SPRT: Automatically Adjusting SELinux Policy for Vulnerability Mitigation
Nowadays, SELinux has been widely applied in Linux systems to enforce security policy and provide flexible MAC. However, improperly configured rules in policies may cause illegal operations and serious security problems to the system. Up till now, it is ...
Utilizing Threat Partitioning for More Practical Network Anomaly Detection
Anomaly-based network intrusion detection would appear on the surface to be ideal for detection of zero-day network threats. Yet in practice, their often unacceptably high false positive rates keep them on the sideline in favor of signature-based methods,...
Prompting LLM to Enforce and Validate CIS Critical Security Control
Proper security control enforcement reduces the attack surface and protects the organizations against attacks. Organizations like NIST and CIS (Center for Internet Security) provide critical security controls (CSCs) as a guideline to enforce cyber ...
Pairing Human and Artificial Intelligence: Enforcing Access Control Policies with LLMs and Formal Specifications
Large Language Models (LLMs), such as ChatGPT and Google Bard, have performed interestingly well when assisting developers on computer programming tasks, a.k.a., coding, thus potentially resulting in convenient and faster software constructions. This new ...
BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots
Humanoid robots will be able to assist humans in their daily life, in particular due to their versatile action capabilities. However, while these robots need a certain degree of autonomy to learn and explore, they also should respect various constraints, ...
A Bargaining-Game Framework for Multi-Party Access Control
Multi-party access control is emerging to protect shared resources in collaborative environments. Existing multi-party access control models often lack essential features to address the challenges characterizing collaborative decision-making. ...
A Self-Sovereign Identity Approach to Decentralized Access Control with Transitive Delegations
In this paper, we introduce a new decentralized access control framework with transitive delegation capabilities that tackles the performance and scalability limitations of the existing state-of-the-art solutions. In order to accomplish this, the ...
Obligation Management Framework for Usage Control
Obligations were introduced in access and usage control as a mechanism to specify mandatory actions to be fulfilled as part of authorization. In this paper, we address challenges related to obligation management in access and usage control, focusing on ...
Converting Rule-Based Access Control Policies: From Complemented Conditions to Deny Rules
Using access control policy rules with deny effects (i.e., negative authorization) can be preferred to using complemented conditions in the rules as they are often easier to comprehend in the context of large policies. However, the two constructs have ...
Hierarchical Key Assignment Schemes with Key Rotation
Hierarchical structures are frequently used to manage access to sensitive data in various contexts, ranging from organizational settings to IoT networks.
A Hierarchical Key Assignment Scheme (HKAS) is designed to cryptographically enforce access control ...
FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption
Functional Encryption (FE) allows users to extract specific function-related information from encrypted data while preserving the privacy of the underlying plaintext. Though significant research has been devoted to developing secure and efficient Multi-...
Circles of Trust: A Voice-Based Authorization Scheme for Securing IoT Smart Homes
Smart homes, powered by a plethora of Internet of Things (IoT) devices, such as smart thermostats, lights, and TVs, have gained immense popularity due to their simple voice command control, making them user-friendly for homeowners and their families. ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
SACMAT '19 | 52 | 12 | 23% |
SACMAT '18 | 50 | 14 | 28% |
SACMAT '17 Abstracts | 50 | 14 | 28% |
SACMAT '16 | 55 | 18 | 33% |
SACMAT '15 | 59 | 17 | 29% |
SACMAT '14 | 58 | 17 | 29% |
SACMAT '13 | 62 | 19 | 31% |
SACMAT '12 | 73 | 19 | 26% |
SACMAT '09 | 75 | 24 | 32% |
SACMAT '03 | 63 | 23 | 37% |
Overall | 597 | 177 | 30% |