Please visit the latest ICACCI2015 website

ICACCI 2014 has been indexed in Scopus

ICACCI-2014 Delhi Photos available online

International Workshop on Access Control Policies, Models and Mechanisms (ACPM-2014)

The emergence of Information and Communications Technologies has provided means for faster and better communication, efficient storage, retrieval and processing of data and exchange and utilization of information to its users. Enforcing protection requires that every access to a system and its resources be controlled and that all and only authorized accesses can take place. Based on security policies, organizations use access control mechanisms to mitigate the risks of unauthorized access to their data, resources, and systems. The first International Workshop on Access Control Policies, Models and Mechanisms (ACPM-2014) will be held in conjunction with Third International Conference on Advances in Computing, Communications and Informatics (ICACCI-2014), Delhi, India. The objective of ACPM-2014 is to provide a forum for researchers and practitioners to present their ideas and contributions on access control policies, models and mechanisms.

Original contributions previously unpublished are solicited in relevant areas including (but not limited to) the following topics:

  • Access Control and Identity Management
  • Access Control Architectures
  • Access Control Design Methodology
  • Access Control in Mobile Systems
  • Access Control Modeling Languages
  • Access Control Models and Extensions
  • Access Control Policy Expression Languages
  • Access Controls and Trust Management
  • Accountability
  • Administration of Access Control Policies
  • Attribute-based Access Control
  • Coalition Access Control
  • Contextualized Situational Awareness in Access Control
  • Data Redaction
  • Delegation
  • Discretionary/Mandatory/Roll Based Access Control
  • Distributed Access Control Architectures and Models
  • Location Based Access Control
  • Privacy-aware Access Control
  • Provenance-based Access Control
  • Risk Aware Access Control
  • Safety Analysis and Enforcement
  • Secure Information Sharing
  • Semantic Aware Access Control Mechanisms
  • Standards for Access Control
  • Theoretical Foundations for Access Control Models

Authors should submit their papers online via EDAS. Unregistered authors should first create an account on EDAS to log on. Further guidelines for submission are posted at:

All submissions will be thoroughly peer-reviewed by experts in the field based on originality, significance and clarity, only papers presenting novel research results or successful innovative applications are considered for publication in the conference proceedings. The accepted and presented papers will be published in the conference proceedings and submitted to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. Independently of the presentation type, all papers are included in the proceedings.


Technical Program Committee
Program Chair(s)
Chun-I Fan, National Sun Yat-sen University, Taiwan
S D Madhukumar, National Institute of Technology Calicut, India
TPC Members
Aneel Rahim, TSSG WIT, Ireland
Benoit Hudzia, SAP Research, United Kingdom
Chang Wu Yu, Chung Hua University, Taiwan
Florian Kerschbaum, SAP Research, Germany
Ghassan Karame, NEC Laboratories Europe, Germany
Hamid Sharif, University of Nebraska-Lincoln, USA
Hang Zhao, Columbia University, USA
Helge Janicke, De Montfort University, United Kingdom
Hongxin Hu, Delaware State University, USA
Houcine Hassan, Universidad Politecnica de Valencia, Spain
Ioannis Anagnostopoulos, University of the Aegean, Greece
Jingqiang Lin, Graduate University of Chinese Academy of Sciences, P.R. China
Jiping Xiong, Zhejiang Normal University, P.R. China
Ju Wang, Virginia State University, USA
Krishna Sampigethaya, University of Washington, USA
Lukasz Krzywiecki, Wroclaw University of Technology, Poland
Mohamed Shehab, University of North Carolina at Charlotte, USA
Mohamed-Ali Kaafar, INRIA France, France
Paulo Gondim, Universidade de Brasilia, Brazil
Peter Lee, Newcastle University, United Kingdom
Phan Cong-Vinh, NTT University, Vietnam
Sachin Agrawal, Indian Institute of Technology IIT Delhi, India
Sara Foresti, Università degli Studi di Milano, Italy
Sherman S. M. Chow, Chinese University of Hong Kong, Hong Kong
Sudarshan TSB, Amrita School of Engineering, India
Suzanne McIntosh, NYU Courant Institute of Mathematical Sciences, USA
Wen Tao Zhu, Institute of Information Engineering, Chinese Academy of Sciences, P.R. China
Wolfgang Apolinarski, University of Duisburg-Essen, Germany
Xinyi Huang, Fujian Normal University, China
Zheng Gong, South China Normal University, P.R. China

Key Dates

 Paper Submission Ends

June 30, 2014

 Acceptance Notification

July 20, 2014

 Final Paper Deadline

August 20, 2014

 Author Registration Closes

August 22, 2014


24 – 27 September 2014







Contact Us