{"id":913,"date":"2024-02-16T19:37:29","date_gmt":"2024-02-16T19:37:29","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2024\/02\/16\/call-for-papers-secure-software-before-code-ing\/"},"modified":"2024-02-16T19:37:29","modified_gmt":"2024-02-16T19:37:29","slug":"call-for-papers-secure-software-before-code-ing","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2024\/02\/16\/call-for-papers-secure-software-before-code-ing\/","title":{"rendered":"Call for Papers: Secure Software Before Code\/ing"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div style=\"font-family: Open Sans, sans-serif; position: relative; overflow: hidden;\">\n<h3>Important Dates<\/h3>\n<ul>\n<li>Submission Deadline: 17 June 2024<\/li>\n<li>Publication: January\/February 2025<\/li>\n<\/ul>\n<hr\/>\n<p><span style=\"font-weight: 400;\">The security of software systems is a growing societal concern, and software engineers are routinely called upon to \u201cdo more\u201d to ensure that the software they write is secure.\u00a0 However, despite the existence of many processes and tools, including programming languages, testing and analysis techniques, the number of technical breaches remains challenging.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This special issue of <em>IEEE Security &amp; Privacy<\/em> will examine how software is secured through the fundamental engineering activities that precede the production, testing, and analysis of code. It will focus on early secure software development such as requirements engineering, architecture, and design. \u202fWe interpret security broadly to include security, privacy, and forensics and from a socio-technical perspective, in which the concern is collectively addressed by software engineering professionals, their companies, and clients.\u00a0\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We invite submissions that extend and challenge current understanding about how to facilitate the production of secure software before code is written. Suggested topics include, but are not limited to:\u00a0<\/span><\/p>\n<p><b>Software Requirements<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Frameworks and models for eliciting and representing security requirements\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Analytical techniques for managing requirements trade-offs\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Tools and techniques for validating security requirements\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Analytical models of assets and threats\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Process models for security policy, auditing, and compliance\u00a0\u00a0<\/span><\/li>\n<\/ul>\n<p><b>Software Architecture and Design<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Techniques for secure interaction design\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Techniques for constructing and selecting secure software architectures\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Patterns for attack-resilient\u00a0 software architecture and design\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Process models for creating secure architectures and designs\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Methods for verification and evaluation of secure architectures and designs\u00a0<\/span><\/li>\n<\/ul>\n<p><b>Studies of Software Development<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Studies of security cultures in software development environments\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Examinations of the security behaviour of software engineers and other stakeholders, including:\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">malice and adversaries\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">shadow practices\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">commitment, motivation, and intent\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The guest editors welcome queries from prospective authors to discuss their potential submissions before the deadline.\u00a0<\/span><\/p>\n<hr\/>\n<h3>Submission Guidelines<\/h3>\n<p>For author information and submission criteria for full-papers, please visit\u00a0the Author Information page. As stated there, full papers should be 4900 \u2013 7200 words in length, with a maximum of 15 references. Please submit full papers through\u00a0the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere.<\/p>\n<hr\/>\n<h3>Questions?<\/h3>\n<p><strong>Contact the guest editors at sp1-25@computer.org.<\/strong><\/p>\n<ul>\n<li data-pm-slice=\"1 1 []\"><span style=\"font-weight: 400;\">Prof. Dr. Eric Bodden, <\/span><i><span style=\"font-weight: 400;\">Paderborn University and Fraunhofer IEM, Germany<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/li>\n<li data-pm-slice=\"1 1 []\"><span style=\"font-weight: 400;\">Dr. Tamara Lopez, <\/span><i><span style=\"font-weight: 400;\">The Open University, UK<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><\/li>\n<li data-pm-slice=\"1 1 []\"><span style=\"font-weight: 400;\">Prof. Bashar Nuseibeh, <\/span><i>Lero, Ireland, and The Open University, UK<\/i><\/li>\n<\/ul><\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/digital-library\/magazines\/sp\/cfp-secure-software\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Important Dates Submission Deadline: 17 June 2024 Publication: January\/February 2025 The security of software systems is a growing societal&hellip;<\/p>\n","protected":false},"author":1,"featured_media":914,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[486,703,704],"tags":[],"class_list":["post-913","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-call-for-papers","category-call-for-papers-filter-post","category-cfp-sp"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=913"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/913\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/914"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}