• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

FacebookTwitterLinkedInInstagramYoutube
  • Home
  • /Digital Library
  • /Magazines
  • /Co
  • Home
  • / ...
  • /Magazines
  • /Co

CLOSED Call for Papers: Special Issue on Software Supply Chains

Submission deadline: 15 March 2022

Publication: October 2022

A software supply chain (SSC) is the sequence of events required to analyze, design, and deliver a software service or product. Although there are similar challenges with SSCs as there are in traditional supply chains--such as outsourcing, risk analysis, and managing relationships--SSCs come with unique challenges that can be more difficult to manage.

An effective and optimized SSC is critical to the success of not only the organization but also its customers. Consider the case of security; there has been a 430% increase in SSC attacks. In the recent SolarWinds attack, a simple customer software update delivery also included a devastating virus. This infected update reached 425 of 500 US Fortune 500 companies, which included telecommunication companies, accounting firms, government, and academic institutions.

Malicious actors are also finding ways to compromise the tools and open source packages used by software developers. Part of the SSC process is making sure the code being developed satisfies the critical requirements of the software. Depending on the scale of the project, this process may include managing software development tools and processes to track and achieve numerous requirements (both functional and not), multiple developers, and unique delivery modes, such as open source, in which the quality and security of the software will be even more difficult to manage.

Just as in a traditional supply chain, once the product is complete, there is also marketing, sales, and retailers that require integration and management. Delivering the software internationally will bring an additional level of challenges such as compliance, translation, and vulnerabilities.

The goal of this special issue is to improve the state of the art and bring together the latest advances, experiences, findings, and developments related to SSCs. We invite novel, innovative, and exciting contributions relating to SSCs. Topics of interest for this special issue include (but are not limited to):

  • SSC security
  • SSC management
  • SSC attacks
  • SSC strategies
  • SSC scalability and performance
  • SSCs and e-business
  • SSCs and open source
  • SSC best practices
  • SSC tools

Submission Guidelines

Please read the Author Information page before submitting a manuscript. For full paper submission, go to ScholarOne Manuscripts.

Only submissions that describe previously unpublished, original, state-of-the-art research and that are not currently under review by a conference or journal will be considered. Extended versions of conference papers must be significantly different (e.g., 50%) from the original conference works.

Feature articles should be no longer than 4,200 words and have no more than 20 references (with tables and figures counting as 300 words each). Illustrations and figures must be camera-ready—they will not be edited and will appear exactly as you submit them.

Submissions are subject to peer review on both technical merit and relevance to Computer’s readership. Articles should be understandable by a broad audience of computer science and engineering professionals, avoiding a focus on theory, mathematics, jargon, and abstract concepts. Accepted papers will be lightly edited for grammar and formatting.

Questions?

Please direct any correspondence before submission to the guest editors at co10-22@computer.org.

Guest Editors

Joanna F. DeFranco, Penn State University (USA)

Nir Kshetri, The University of North Carolina at Greensboro (USA)

LATEST NEWS
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Autonomous Observability: AI Agents That Debug AI
Autonomous Observability: AI Agents That Debug AI
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Read Next

From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference

Copilot Ergonomics: UI Patterns that Reduce Cognitive Load

The Myth of AI Neutrality in Search Algorithms

Gen AI and LLMs: Rebuilding Trust in a Synthetic Information Age

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter