Digital Library


Search: "[ keyword: Traceability ]" (9)
    Traceability Enhancement Technique for Dependency Relations of Software Artifacts based on the Integration of Software Configuration Management System and Personal Workspace
    Dae Yeob Kim , Cheong Youn The KIPS Transactions:PartD, Vol. 18, No. 6, pp. 451-460, Dec. 2011
    10.3745/KIPSTD.2011.18.6.451

    A Study of Requirement Change Management and Traceability Effect Using Traceability Table
    Ju Young Kim , Sung Yul Rhew , Man Su Hwang The KIPS Transactions:PartD, Vol. 17, No. 4, pp. 271-282, Aug. 2010
    10.3745/KIPSTD.2010.17.4.271

    Traceability Enhancement Technique Through the Integration of Software Configuration Management and Personal Working Space
    Dae Yeob Kim , Cheong Youn The KIPS Transactions:PartD, Vol. 16, No. 6, pp. 899-910, Dec. 2009
    10.3745/KIPSTD.2009.16.6.899

    Traceability of UML Based Test Artifacts Using XML
    Kwang Ik Seo , Eun Man Choi The KIPS Transactions:PartD, Vol. 16, No. 2, pp. 213-222, Apr. 2009
    10.3745/KIPSTD.2009.16.2.213

    Requirements Trace Table Expansion and How to Normalization
    Ju Young Kim , Rhew Sung Yul The KIPS Transactions:PartD, Vol. 16, No. 2, pp. 201-212, Apr. 2009
    10.3745/KIPSTD.2009.16.2.201

    Rigorous System Testing by Supporting Vertical Traceability
    Seo Kwang Ik , Eun Man Choi The KIPS Transactions:PartD, Vol. 14, No. 7, pp. 753-762, Dec. 2007
    10.3745/KIPSTD.2007.14.7.753

    Secure Location Information Protection Scheme from the Network Provider and the third party in Mobile Communication Environments
    Kim Sun Seog , Lee Chang Hun The KIPS Transactions:PartC, Vol. 10, No. 7, pp. 867-878, Dec. 2003
    10.3745/KIPSTC.2003.10.7.867

    Study about Component Identification Method Based On RUP
    Mi Sook Choi, Yong Ik Yoon, Jai Nyun Park The KIPS Transactions:PartD, Vol. 9, No. 1, pp. 91-102, Feb. 2002
    10.3745/KIPSTD.2002.9.1.91

    Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria
    Jisoo Park, Seungjoo Kim KIPS Transactions on Computer and Communication Systems, Vol. 6, No. 3, pp. 121-134, Mar. 2017
    10.3745/KTCCS.2017.6.3.121
    Keywords: SDLC, Threat Modeling, Security Requirements, Traceability