Contact

General Chairs

Scott D. Stoller
Stony Brook University, USA
Email: stoller@cs.stonybrook.edu
Omar Chowdhury
Stony Brook University, USA
Email: omar@cs.stonybrook.edu

Find us on Social Media

Symposium on Access Control Models and Technologies

The 30th ACM Symposium on Access Control Models and Technologies

July 8 - 10, 2025. Stony Brook, NY, USA

Recent News

  • July 10, 2025: The list of awards for SACMAT 2025 has been annonuced. Hearty congratulations to the winners!
    • Best Paper Award: BlueSky: Towards Explainable Access Control, by Gelareh Hasel Mehri, Charles Morisset, and Nicola Zannone.
    • Best Paper Runner-Up Award: Safety analysis in the NGAC model, by Brian Tan, Ewan Davies, Indrakshi Ray, and Mahmoud Abdelgawad.
    • Test of Time Award: Relationship-Based Access Control for an Open-Source Medical Records System, by Syed Zain R. Rizvi, Philip W.L. Fong, Jason Crampton, and James Sellwood, SACMAT'15
  • June 9, 2025: The registration site is now live! Please check out for the Registration page for more details.
  • June 8, 2025: The accommodation details on the Venue page have been updated. We strongly encourage you to reserve your hotel room as soon as possible, as rates are likely to increase closer to the conference dates.
  • May 30, 2025: The tentative program is now available.
  • May 15, 2025: Accommodation and Hotel Booking Information is now available.
  • May 6, 2025: The List of Accepted Papers has been published.
  • Important: The Author Notification Date has been postponed to May 1, 2025!
  • Important: The Abstract and Paper Submission Deadline has been extended to March 31, 2025!
  • We are social! Find us on X and LinkedIn for latest news and updates.
  • The Call for Papers for 30th ACM SACMAT Website has been published.
  • The official website for the 30th ACM Symposium on Access Control Models and Technologies (SACMAT) is now live.

About SACMAT

Access control has long been one of the most widely adopted and foundational security technologies. It has been seamlessly integrated into operating systems like Multics and Unix—pioneering platforms that contributed to Turing Award-winning innovations—and continues to underpin security in modern mobile devices and cloud computing. Its efficiency and effectiveness have stood the test of time. However, the landscape of computing has dramatically changed since the inception of the ACM Symposium on Access Control Models and Technologies (SACMAT) conference in 1994. We now operate in a deeply interconnected, networked world where no single application or device can act as a fully trusted reference monitor to enforce access control in isolation. This shift demands new trust models, management strategies, enforcement techniques, and supporting mechanisms, such as advanced authentication. In response, SACMAT invites researchers to explore and propose innovative, efficient, and effective security mechanisms designed for distributed, networked computing environments.