• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

FacebookTwitterLinkedInInstagramYoutube
  • Home
  • /Digital Library
  • /Magazines
  • /Sp
  • Home
  • / ...
  • /Magazines
  • /Sp

CLOSED: Call for Papers: Special Issue on Secure Software Before Code/ing

IEEE Security & Privacy seeks submissions for this upcoming special issue.

Important Dates

  • Submission Deadline: 17 June 2024
  • Publication: January/February 2025


The security of software systems is a growing societal concern, and software engineers are routinely called upon to "do more" to ensure that the software they write is secure.  However, despite the existence of many processes and tools, including programming languages, testing and analysis techniques, the number of technical breaches remains challenging. 

This special issue of IEEE Security & Privacy will examine how software is secured through the fundamental engineering activities that precede the production, testing, and analysis of code. It will focus on early secure software development such as requirements engineering, architecture, and design.  We interpret security broadly to include security, privacy, and forensics and from a socio-technical perspective, in which the concern is collectively addressed by software engineering professionals, their companies, and clients.   

We invite submissions that extend and challenge current understanding about how to facilitate the production of secure software before code is written. Suggested topics include, but are not limited to: 

Software Requirements 

  • Frameworks and models for eliciting and representing security requirements 
  • Analytical techniques for managing requirements trade-offs  
  • Tools and techniques for validating security requirements 
  • Analytical models of assets and threats 
  • Process models for security policy, auditing, and compliance  

Software Architecture and Design 

  • Techniques for secure interaction design  
  • Techniques for constructing and selecting secure software architectures 
  • Patterns for attack-resilient  software architecture and design 
  • Process models for creating secure architectures and designs 
  • Methods for verification and evaluation of secure architectures and designs 

Studies of Software Development 

  • Studies of security cultures in software development environments 
  • Examinations of the security behaviour of software engineers and other stakeholders, including: 
    • malice and adversaries 
    • shadow practices 
    • commitment, motivation, and intent 

The guest editors welcome queries from prospective authors to discuss their potential submissions before the deadline. 


Submission Guidelines

For author information and submission criteria for full-papers, please visit the Author Information page. As stated there, full papers should be 4900 – 7200 words in length, with a maximum of 15 references. Please submit full papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere.


Questions?

Contact the guest editors at sp1-25@computer.org.

  • Prof. Dr. Eric Bodden, Paderborn University and Fraunhofer IEM, Germany  
  • Dr. Tamara Lopez, The Open University, UK 
  • Prof. Bashar Nuseibeh, Lero, Ireland, and The Open University, UK

LATEST NEWS
CV Template
CV Template
A History of Rendering the Future with Computer Graphics & Applications
A History of Rendering the Future with Computer Graphics & Applications
AI Assisted Identity Threat Detection and Zero Trust Access Enforcement
AI Assisted Identity Threat Detection and Zero Trust Access Enforcement
Resume Template
Resume Template
IEEE Reveals 2026 Predictions for Top Technology Trends 
IEEE Reveals 2026 Predictions for Top Technology Trends 
Read Next

CV Template

A History of Rendering the Future with Computer Graphics & Applications

AI Assisted Identity Threat Detection and Zero Trust Access Enforcement

Resume Template

IEEE Reveals 2026 Predictions for Top Technology Trends 

7 Best Practices for Secure Software Engineering in 2026

Muzeeb Mohammad: IEEE Computer Society Leader in Cloud Tech

Setting the Standard: How SWEBOK Helps Organizations Build Reliable and Future-Ready Teams

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter