ACPM 2014 - International Workshop on Access Control Policies, Models and Mechanisms (ACPM-2014)
Topics/Call fo Papers
International Workshop on Access Control Policies, Models and Mechanisms (ACPM-2014)
http://icacci-conference.org/website/ACPM2014
The emergence of Information and Communications Technologies has provided means for faster and better communication, efficient storage, retrieval and processing of data and exchange and utilization of information to its users. Enforcing protection requires that every access to a system and its resources be controlled and that all and only authorized accesses can take place. Based on security policies, organizations use access control mechanisms to mitigate the risks of unauthorized access to their data, resources, and systems. The first International Workshop on Access Control Policies, Models and Mechanisms (ACPM-2014) will be held in conjunction with Third International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014), Delhi, India. The objective of ACPM-2014 is to provide a forum for researchers and practitioners to present their ideas and contributions on access control policies, models and mechanisms.
Original contributions previously unpublished are solicited in relevant areas including (but not limited to) the following topics:
Access Control and Identity Management
Access Control Architectures
Access Control Design Methodology
Access Control in Mobile Systems
Access Control Modeling Languages
Access Control Models and Extensions
Access Control Policy Expression Languages
Access Controls and Trust Management
Accountability
Administration of Access Control Policies
Attribute-based Access Control
Coalition Access Control
Contextualized Situational Awareness in Access Control
Data Redaction
Delegation
Discretionary/Mandatory/Roll Based Access Control
Distributed Access Control Architectures and Models
Location Based Access Control
Privacy-aware Access Control
Provenance-based Access Control
Risk Aware Access Control
Safety Analysis and Enforcement
Secure Information Sharing
Semantic Aware Access Control Mechanisms
Standards for Access Control
Theoretical Foundations for Access Control Models
Authors should submit their papers online via EDAS. Unregistered authors should first create an account on EDAS to log on. Further guidelines for submission are posted at: http://icacci-conference.org/website/call-papers
http://icacci-conference.org/website/ACPM2014
The emergence of Information and Communications Technologies has provided means for faster and better communication, efficient storage, retrieval and processing of data and exchange and utilization of information to its users. Enforcing protection requires that every access to a system and its resources be controlled and that all and only authorized accesses can take place. Based on security policies, organizations use access control mechanisms to mitigate the risks of unauthorized access to their data, resources, and systems. The first International Workshop on Access Control Policies, Models and Mechanisms (ACPM-2014) will be held in conjunction with Third International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014), Delhi, India. The objective of ACPM-2014 is to provide a forum for researchers and practitioners to present their ideas and contributions on access control policies, models and mechanisms.
Original contributions previously unpublished are solicited in relevant areas including (but not limited to) the following topics:
Access Control and Identity Management
Access Control Architectures
Access Control Design Methodology
Access Control in Mobile Systems
Access Control Modeling Languages
Access Control Models and Extensions
Access Control Policy Expression Languages
Access Controls and Trust Management
Accountability
Administration of Access Control Policies
Attribute-based Access Control
Coalition Access Control
Contextualized Situational Awareness in Access Control
Data Redaction
Delegation
Discretionary/Mandatory/Roll Based Access Control
Distributed Access Control Architectures and Models
Location Based Access Control
Privacy-aware Access Control
Provenance-based Access Control
Risk Aware Access Control
Safety Analysis and Enforcement
Secure Information Sharing
Semantic Aware Access Control Mechanisms
Standards for Access Control
Theoretical Foundations for Access Control Models
Authors should submit their papers online via EDAS. Unregistered authors should first create an account on EDAS to log on. Further guidelines for submission are posted at: http://icacci-conference.org/website/call-papers
Other CFPs
- International Workshop on Advances in Satellite Communications and Networking (SatComNet’14)
- International Workshop on Application of Thresholds in Algorithms, Circuits and Systems (Threshnomics-2014)
- International Workshop on Cognitive Computing and Applications (COGNITIVE-2014)
- International Workshop on Computational Advertising (WCA-2014)
- International Workshop on Under Water Communication Systems and Networks (UWCSN 2014)
Last modified: 2014-04-21 22:47:07