In an age where cyber threats are omnipresent, ensuring the security of software systems from the ground up is paramount. Security-by-Design (SbD) is emerging as an essential approach, integrating security measures into every phase of the software development lifecycle—from initial specification and design to testing, deployment, and maintenance.
This paradigm shift aims to produce inherently secure software systems that are resilient to evolving cyber threats, thereby safeguarding data and maintaining user trust.
Despite the clear advantages of SbD, its widespread adoption hinges on the industry’s ability to manage the necessary methodological transformations and integrate new tools and practices. To advance beyond traditional approaches, there is a pressing need to embrace SbD as a fundamental aspect of the development process, ensuring that security is not merely an afterthought but a core principle.
This special session offers a platform to discuss, investigate, and address the opportunities and challenges associated with implementing Security-by-Design in software development. We will explore topics such as how to effectively choose, evaluate, and integrate SbD techniques into current development practices to enhance security while balancing costs and benefits. The session will also examine case studies showcasing successful SbD implementations, highlighting best practices and lessons learned.
Furthermore, as SbD principles are applied, they can also enhance the development of secure software artifacts themselves, contributing to the creation of trustworthy and robust systems.
By embedding security considerations into every layer of development, SbD not only mitigates risks but also fosters innovation and reliability in software systems.
Topics to be discussed in this special session include (but are not limited to) the following:
Researchers and practitioners are invited to submit papers for this special theme session on Adopting Security-by-Design for Secure Software Systems on or before September 10th, 2024 (Extended Deadline).
All submissions must be original and may not be under review by another publication.
All papers should be submitted
electronically through the easychair submission system as mentioned below:
The paper prior to submission should be checked for plagiarism from licensed plagiarism softwares like Turnitin/iAuthenticate etc. The similarity content should not exceed 20%.
INTERESTED AUTHORS SHOULD CONSULT THE CONFERENCE’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at https://icactce-conf.com/call-for-papers-2/.
All submitted papers will be reviewed on a double-blind, peer review basis.
All the accepted papers (after double blinded peer review) will be published within the ICACTCE’24 Proceedings (SCOPUS Indexed).
NOTE: While submitting paper in this special session, please specify Adopting Security-by-Design for Secure Software Systems at the top (above paper title) of the first page of your paper.