ICSS 2017 - 3rd International conference on software security (ICSS 2017)
Date2017-12-23 - 2017-12-24
Deadline2017-11-25
VenueSydney, Australia
KeywordsSoftware Security for Web; Software Penetration and Pro; Security of Open Source Soft
Topics/Call fo Papers
Http://acity2018.org/icss/index.html
23~24 December, 2017, Sydney, Australia
Call for Papers
Traditionally, security in software has been thought to be something that can be easily added on as a patch, post-development, and sometimes even after the deployment of the software. According to the US-Computer Emergency Readiness Team (US-CERT), "most successful attacks result from targeting and exploiting known, non-patched software vulnerabilities and insecure software configurations, many of which are introduced during design and code." Hence, it is imperative that secure design, coding and testing principles as well as deployment and maintenance are thoroughly embedded in the software development lifecycle. Arence Ont the same time, software security is very inter-disciplinary, as software is being developed for a variety of applications - web, Internet, database, single and distributed computer systems, etc.
In the above context, the First International Conference on Software Security brings together researchers, faculty, students and industry professionals who are experts in different domains of computer and information security, but all leading to the design, development, deployment and maintenance of secure software. We invite papers that are both theoretical as well as practical in nature, from both academia and industry. Some of the topics of interest (but not limited to) are:
Topics of Interest
• Network Protocols & Wireless Networks
• Network Architectures
• Secure Software Development Lifecycle
• Principles and Models for Secure Software Design
• Secure Coding Standards and Their Implementation
• Software Security for Wireless and Mobile Applications
• Software Security for Database Systems
• Software Security for Web and Internet Applications
• Security of Open Source Software
• Software Threats and Vulnerabilities
• Risk Analysis for Software Security
• Software Security Attacks and Solutions
• Static and Dynamic Code Analysis for Software Security
• Validation, Verification and Testing for Software Security
• Virtualization and Cloud Computing for Software Security
• Cryptography for Software Security
• Firewalls and Intrusion Detection/Prevention Systems for Software Security
• Software Penetration and Protection
• Measurements and Metrics for Software Security
Papers must be of high quality, unpublished, and currently not accepted or under review by another conference, workshop, or journal.
Paper Submission
Authors are invited to submit papers through the Conference Submission System by November 25, 2017. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference.The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).
Hard copy of the Proceedings will be distributed during the Conference. The soft Copy will be available on AIRCC Digital Library. Selected papers from ICSS 2017, after further revisions, will be published in the special issue of the following journal.
•
o International Journal of Computer Networks & Communications (IJCNC) - ERA Indexed, UGC listed
o International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, UGC listed
o International Journal On Cryptography And Information Security (IJCIS)
o International Journal of Security, Privacy and Trust Management ( IJSPTM)
• International Journal of Software Engineering & Applications (IJSEA)
Important Dates
• Submission Deadline : November 25, 2017
• Authors Notification : December 18, 2017
• Registration & Camera-Ready Paper Due : December 21, 2017
23~24 December, 2017, Sydney, Australia
Call for Papers
Traditionally, security in software has been thought to be something that can be easily added on as a patch, post-development, and sometimes even after the deployment of the software. According to the US-Computer Emergency Readiness Team (US-CERT), "most successful attacks result from targeting and exploiting known, non-patched software vulnerabilities and insecure software configurations, many of which are introduced during design and code." Hence, it is imperative that secure design, coding and testing principles as well as deployment and maintenance are thoroughly embedded in the software development lifecycle. Arence Ont the same time, software security is very inter-disciplinary, as software is being developed for a variety of applications - web, Internet, database, single and distributed computer systems, etc.
In the above context, the First International Conference on Software Security brings together researchers, faculty, students and industry professionals who are experts in different domains of computer and information security, but all leading to the design, development, deployment and maintenance of secure software. We invite papers that are both theoretical as well as practical in nature, from both academia and industry. Some of the topics of interest (but not limited to) are:
Topics of Interest
• Network Protocols & Wireless Networks
• Network Architectures
• Secure Software Development Lifecycle
• Principles and Models for Secure Software Design
• Secure Coding Standards and Their Implementation
• Software Security for Wireless and Mobile Applications
• Software Security for Database Systems
• Software Security for Web and Internet Applications
• Security of Open Source Software
• Software Threats and Vulnerabilities
• Risk Analysis for Software Security
• Software Security Attacks and Solutions
• Static and Dynamic Code Analysis for Software Security
• Validation, Verification and Testing for Software Security
• Virtualization and Cloud Computing for Software Security
• Cryptography for Software Security
• Firewalls and Intrusion Detection/Prevention Systems for Software Security
• Software Penetration and Protection
• Measurements and Metrics for Software Security
Papers must be of high quality, unpublished, and currently not accepted or under review by another conference, workshop, or journal.
Paper Submission
Authors are invited to submit papers through the Conference Submission System by November 25, 2017. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference.The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).
Hard copy of the Proceedings will be distributed during the Conference. The soft Copy will be available on AIRCC Digital Library. Selected papers from ICSS 2017, after further revisions, will be published in the special issue of the following journal.
•
o International Journal of Computer Networks & Communications (IJCNC) - ERA Indexed, UGC listed
o International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed, UGC listed
o International Journal On Cryptography And Information Security (IJCIS)
o International Journal of Security, Privacy and Trust Management ( IJSPTM)
• International Journal of Software Engineering & Applications (IJSEA)
Important Dates
• Submission Deadline : November 25, 2017
• Authors Notification : December 18, 2017
• Registration & Camera-Ready Paper Due : December 21, 2017
Other CFPs
- The IIER -222nd International Conference on Social Science and Economics (ICSSE)
- The IIER -210th International Conference on Science, Innovation and Management (ICSIM)
- The IIER -222nd International Conference on Recent Innovations in Engineering and Technology (ICRIET)
- The IIER- 217th International Conference on Recent Advances in Medical Science (ICRAMS)
- The IIER -223rd International Conference on Natural Science and Environment (ICNSE)
Last modified: 2017-11-20 19:38:06