• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2026 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /Sp
  • Home
  • / ...
  • /Magazines
  • /Sp

CLOSED: Call for Papers: Special Issue on Secure Software Before Code/ing

IEEE Security & Privacy seeks submissions for this upcoming special issue.

Important Dates

  • Submission Deadline: 17 June 2024
  • Publication: January/February 2025


The security of software systems is a growing societal concern, and software engineers are routinely called upon to "do more" to ensure that the software they write is secure.  However, despite the existence of many processes and tools, including programming languages, testing and analysis techniques, the number of technical breaches remains challenging. 

This special issue of IEEE Security & Privacy will examine how software is secured through the fundamental engineering activities that precede the production, testing, and analysis of code. It will focus on early secure software development such as requirements engineering, architecture, and design.  We interpret security broadly to include security, privacy, and forensics and from a socio-technical perspective, in which the concern is collectively addressed by software engineering professionals, their companies, and clients.   

We invite submissions that extend and challenge current understanding about how to facilitate the production of secure software before code is written. Suggested topics include, but are not limited to: 

Software Requirements 

  • Frameworks and models for eliciting and representing security requirements 
  • Analytical techniques for managing requirements trade-offs  
  • Tools and techniques for validating security requirements 
  • Analytical models of assets and threats 
  • Process models for security policy, auditing, and compliance  

Software Architecture and Design 

  • Techniques for secure interaction design  
  • Techniques for constructing and selecting secure software architectures 
  • Patterns for attack-resilient  software architecture and design 
  • Process models for creating secure architectures and designs 
  • Methods for verification and evaluation of secure architectures and designs 

Studies of Software Development 

  • Studies of security cultures in software development environments 
  • Examinations of the security behaviour of software engineers and other stakeholders, including: 
    • malice and adversaries 
    • shadow practices 
    • commitment, motivation, and intent 

The guest editors welcome queries from prospective authors to discuss their potential submissions before the deadline. 


Submission Guidelines

For author information and submission criteria for full-papers, please visit the Author Information page. As stated there, full papers should be 4900 – 7200 words in length, with a maximum of 15 references. Please submit full papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere.


Questions?

Contact the guest editors at sp1-25@computer.org.

  • Prof. Dr. Eric Bodden, Paderborn University and Fraunhofer IEM, Germany  
  • Dr. Tamara Lopez, The Open University, UK 
  • Prof. Bashar Nuseibeh, Lero, Ireland, and The Open University, UK

LATEST NEWS
Episode 1 | Interview with Michelle Tomes
Episode 1 | Interview with Michelle Tomes
Celebrating Excellence: 2025 IEEE Transactions on Mobile Computing Awards
Celebrating Excellence: 2025 IEEE Transactions on Mobile Computing Awards
Tech Horizons: Building AI Skills and Confidence in Panama’s Youth
Tech Horizons: Building AI Skills and Confidence in Panama’s Youth
TechMovel: Expanding Digital Access in Brazil
TechMovel: Expanding Digital Access in Brazil
InfiLab Podcast: Fueling Your Tech Career with Sowmya Chintakindi
InfiLab Podcast: Fueling Your Tech Career with Sowmya Chintakindi
Read Next

Episode 1 | Interview with Michelle Tomes

Celebrating Excellence: 2025 IEEE Transactions on Mobile Computing Awards

Tech Horizons: Building AI Skills and Confidence in Panama’s Youth

TechMovel: Expanding Digital Access in Brazil

InfiLab Podcast: Fueling Your Tech Career with Sowmya Chintakindi

How Hardware-Level Security Enhances Operational Visibility and Resilience

The Future of Automated Debugging and Software Testing with Harlan D Mills Award Winner Andreas Zeller

IEEE CS High-Performance Computing Conference SC Recognized as Fastest Growing Event in 2025

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter