skip to main content
10.1145/3649158acmconferencesBook PagePublication PagessacmatConference Proceedingsconference-collections
SACMAT 2024: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies
ACM2024 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SACMAT 2024: The 29th ACM Symposium on Access Control Models and Technologies San Antonio TX USA May 15 - 17, 2024
ISBN:
979-8-4007-0491-8
Published:
25 June 2024
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 29th ACM Symposium on Access Control Models and Technologies (SACMAT 2024). This year's symposium continues its tradition of being the premier venue for presenting research results and experience reports on cutting edge advances on access control, including models, systems, applications, and theory, while also embracing an expanded focus on the general area of computer and information security and privacy. The overarching goal of the symposium is to share novel access control and computer security solutions that fulfill the needs of emerging applications and environments, and also to identify new directions for future research and development. ACM SACMAT provides researchers and also practitioners with a unique opportunity to share their perspectives with others interested in the various aspects of access control and computer security.

Skip Table Of Content Section
SESSION: Keynote Talks
keynote
Free
AI/ML, Graphs and Access Control: Towards Holistic Identity and Access Management

Vulnerabilities in identity and access management (IAM) are one of the most common reasons for data breaches leading to adversarial impacts on security, privacy and compliance postures. Account breaches, incorrectly designed access control policies, ...

keynote
Free
Cryptographic Enforcement of Access Control Policies: Models, Applications, and Future Directions

Cryptographic enforcement of access control policies is a rapidly evolving field with ongoing research and development aimed at addressing emerging security challenges and requirements.

Among the different techniques to cryptographically enforce access ...

keynote
Free
Trustworthy Artificial Intelligence for Securing Transportation Systems

Artificial Intelligence (AI) techniques are being applied to numerous applications from Healthcare to Cyber Security to Finance. For example, Machine Learning (ML) algorithms are being applied to solve security problems such as malware analysis and ...

SESSION: Regular Track 1 (Privacy)
research-article
Open Access
ToneCheck: Unveiling the Impact of Dialects in Privacy Policy

Users frequently struggle to decipher privacy policies, facing challenges due to the legalese often present in privacy policies, leaving trust and comprehension shrouded in ambiguity. This study dives into the transformative power of language, exploring ...

research-article
Open Access
Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning

The popularity of Machine Learning (ML) makes the privacy of sensitive data more imperative than ever. Collaborative learning techniques like Split Learning (SL) aim to protect client data while enhancing ML processes. Though promising, SL has been ...

short-paper
Open Access
Making Privacy-preserving Federated Graph Analytics Practical (for Certain Queries)

Privacy-preserving federated graph analytics is an emerging area of research. The goal is to run graph analytics queries over a set of devices that are organized as a graph while keeping the raw data on the devices rather than centralizing it. Further, ...

SESSION: Work-In-Progress Track
short-paper
Open Access
WiP: Enhancing the Comprehension of XACML Policies

Policy comprehension is crucial for ensuring data protection. Yet, policies written in flexible and expressive languages such as XACML are not easy to comprehend. In this work, we propose a visualization framework to facilitate the comprehension of XACML ...

short-paper
Open Access
Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks

Multi-cloud applications have become ubiquitous in today's organizations. Multi-cloud applications are being deployed across cloud service provider platforms to deliver services to all aspects of business. With the expansive use of multi-cloud ...

short-paper
Open Access
SecureCheck: User-Centric and Geolocation-Aware Access Mediation Contracts for Sharing Private Data

Data oversharing is a critical issue in today's technologically driven society. Numerous entities, i.e., corporations, governments, criminal groups, are collecting individuals' data. One potential cause is that current systems, such as verification ...

SESSION: Regular Track 2 (Policy Analysis and Validation)
research-article
Free
Static and Dynamic Analysis of a Usage Control System

The ability to exchange data while maintaining sovereignty is fundamental to emerging decentralized data-driven ecosystems. Data sovereignty refers to the entity's capability to be self-determined concerning data usage. As such, a data usage control ...

research-article
Open Access
SPRT: Automatically Adjusting SELinux Policy for Vulnerability Mitigation

Nowadays, SELinux has been widely applied in Linux systems to enforce security policy and provide flexible MAC. However, improperly configured rules in policies may cause illegal operations and serious security problems to the system. Up till now, it is ...

short-paper
Open Access
Utilizing Threat Partitioning for More Practical Network Anomaly Detection

Anomaly-based network intrusion detection would appear on the surface to be ideal for detection of zero-day network threats. Yet in practice, their often unacceptably high false positive rates keep them on the sideline in favor of signature-based methods,...

SESSION: Regular Track 3 (LLMs and Access Control Management)
research-article
Free
Prompting LLM to Enforce and Validate CIS Critical Security Control

Proper security control enforcement reduces the attack surface and protects the organizations against attacks. Organizations like NIST and CIS (Center for Internet Security) provide critical security controls (CSCs) as a guideline to enforce cyber ...

research-article
Free
Pairing Human and Artificial Intelligence: Enforcing Access Control Policies with LLMs and Formal Specifications

Large Language Models (LLMs), such as ChatGPT and Google Bard, have performed interestingly well when assisting developers on computer programming tasks, a.k.a., coding, thus potentially resulting in convenient and faster software constructions. This new ...

SESSION: Blue Sky/Vision Track
research-article
Open Access
BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots

Humanoid robots will be able to assist humans in their daily life, in particular due to their versatile action capabilities. However, while these robots need a certain degree of autonomy to learn and explore, they also should respect various constraints, ...

SESSION: Regular Track 4 (Access Control Framework)
research-article
Open Access
Honorable Mention
Honorable Mention
A Bargaining-Game Framework for Multi-Party Access Control

Multi-party access control is emerging to protect shared resources in collaborative environments. Existing multi-party access control models often lack essential features to address the challenges characterizing collaborative decision-making. ...

short-paper
Free
A Self-Sovereign Identity Approach to Decentralized Access Control with Transitive Delegations

In this paper, we introduce a new decentralized access control framework with transitive delegation capabilities that tackles the performance and scalability limitations of the existing state-of-the-art solutions. In order to accomplish this, the ...

short-paper
Open Access
Obligation Management Framework for Usage Control

Obligations were introduced in access and usage control as a mechanism to specify mandatory actions to be fulfilled as part of authorization. In this paper, we address challenges related to obligation management in access and usage control, focusing on ...

SESSION: Regular Track 5 (Policy Management and Enforcement)
research-article
Open Access
Best Paper
Best Paper
Converting Rule-Based Access Control Policies: From Complemented Conditions to Deny Rules

Using access control policy rules with deny effects (i.e., negative authorization) can be preferred to using complemented conditions in the rules as they are often easier to comprehend in the context of large policies. However, the two constructs have ...

research-article
Free
Hierarchical Key Assignment Schemes with Key Rotation

Hierarchical structures are frequently used to manage access to sensitive data in various contexts, ranging from organizational settings to IoT networks.

A Hierarchical Key Assignment Scheme (HKAS) is designed to cryptographically enforce access control ...

short-paper
Open Access
FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption

Functional Encryption (FE) allows users to extract specific function-related information from encrypted data while preserving the privacy of the underlying plaintext. Though significant research has been devoted to developing secure and efficient Multi-...

poster
Free
Circles of Trust: A Voice-Based Authorization Scheme for Securing IoT Smart Homes

Smart homes, powered by a plethora of Internet of Things (IoT) devices, such as smart thermostats, lights, and TVs, have gained immense popularity due to their simple voice command control, making them user-friendly for homeowners and their families. ...

Contributors
  • The University of Texas at San Antonio
  • Rutgers University–New Brunswick

Recommendations

Acceptance Rates

Overall Acceptance Rate 177 of 597 submissions, 30%
YearSubmittedAcceptedRate
SACMAT '19521223%
SACMAT '18501428%
SACMAT '17 Abstracts501428%
SACMAT '16551833%
SACMAT '15591729%
SACMAT '14581729%
SACMAT '13621931%
SACMAT '12731926%
SACMAT '09752432%
SACMAT '03632337%
Overall59717730%