• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
FacebookTwitterLinkedInInstagramYoutube
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /Co
  • Home
  • / ...
  • /Magazines
  • /Co

CLOSED Call for Papers: Special Issue on Software Supply Chains

Submission deadline: 15 March 2022 Publication: October 2022 A software supply chain (SSC) is the sequence of events required to analyze, design, and deliver a software service or product. Although there are similar challenges with SSCs as there are in traditional supply chains--such as outsourcing, risk analysis, and managing relationships--SSCs come with unique challenges that can be more difficult to manage. An effective and optimized SSC is critical to the success of not only the organization but also its customers. Consider the case of security; there has been a 430% increase in SSC attacks. In the recent SolarWinds attack, a simple customer software update delivery also included a devastating virus. This infected update reached 425 of 500 US Fortune 500 companies, which included telecommunication companies, accounting firms, government, and academic institutions. Malicious actors are also finding ways to compromise the tools and open source packages used by software developers. Part of the SSC process is making sure the code being developed satisfies the critical requirements of the software. Depending on the scale of the project, this process may include managing software development tools and processes to track and achieve numerous requirements (both functional and not), multiple developers, and unique delivery modes, such as open source, in which the quality and security of the software will be even more difficult to manage. Just as in a traditional supply chain, once the product is complete, there is also marketing, sales, and retailers that require integration and management. Delivering the software internationally will bring an additional level of challenges such as compliance, translation, and vulnerabilities. The goal of this special issue is to improve the state of the art and bring together the latest advances, experiences, findings, and developments related to SSCs. We invite novel, innovative, and exciting contributions relating to SSCs. Topics of interest for this special issue include (but are not limited to):
  • SSC security
  • SSC management
  • SSC attacks
  • SSC strategies
  • SSC scalability and performance
  • SSCs and e-business
  • SSCs and open source
  • SSC best practices
  • SSC tools

Submission Guidelines

Please read the Author Information page before submitting a manuscript. For full paper submission, go to ScholarOne Manuscripts. Only submissions that describe previously unpublished, original, state-of-the-art research and that are not currently under review by a conference or journal will be considered. Extended versions of conference papers must be significantly different (e.g., 50%) from the original conference works. Feature articles should be no longer than 4,200 words and have no more than 20 references (with tables and figures counting as 300 words each). Illustrations and figures must be camera-ready—they will not be edited and will appear exactly as you submit them. Submissions are subject to peer review on both technical merit and relevance to Computer’s readership. Articles should be understandable by a broad audience of computer science and engineering professionals, avoiding a focus on theory, mathematics, jargon, and abstract concepts. Accepted papers will be lightly edited for grammar and formatting.

Questions?

Please direct any correspondence before submission to the guest editors at co10-22@computer.org. Guest Editors Joanna F. DeFranco, Penn State University (USA) Nir Kshetri, The University of North Carolina at Greensboro (USA)
LATEST NEWS
Shaping the Future of HPC through Architectural Innovation and Industry Collaboration
Shaping the Future of HPC through Architectural Innovation and Industry Collaboration
Reimagining AI Hardware: Neuromorphic Computing for Sustainable, Real-Time Intelligence
Reimagining AI Hardware: Neuromorphic Computing for Sustainable, Real-Time Intelligence
Quantum Insider Session Series: Strategic Networking in the Quantum Ecosystem for Collective Success
Quantum Insider Session Series: Strategic Networking in the Quantum Ecosystem for Collective Success
Computing’s Top 30: Sukanya S. Meher
Computing’s Top 30: Sukanya S. Meher
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Read Next

Shaping the Future of HPC through Architectural Innovation and Industry Collaboration

Reimagining AI Hardware: Neuromorphic Computing for Sustainable, Real-Time Intelligence

Quantum Insider Session Series: Strategic Networking in the Quantum Ecosystem for Collective Success

Computing’s Top 30: Sukanya S. Meher

Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces

Computing’s Top 30: Tejas Padliya

Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration

IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter