Digital Library
Search: "[ keyword: Traceability ]" (9)
Traceability Enhancement Technique for Dependency Relations of Software Artifacts based on the Integration of Software Configuration Management System and Personal Workspace
Dae Yeob Kim , Cheong Youn The KIPS Transactions:PartD,
Vol. 18, No. 6, pp. 451-460,
Dec.
2011
10.3745/KIPSTD.2011.18.6.451
10.3745/KIPSTD.2011.18.6.451
A Study of Requirement Change Management and Traceability Effect Using Traceability Table
Ju Young Kim , Sung Yul Rhew , Man Su Hwang The KIPS Transactions:PartD,
Vol. 17, No. 4, pp. 271-282,
Aug.
2010
10.3745/KIPSTD.2010.17.4.271
10.3745/KIPSTD.2010.17.4.271
Traceability Enhancement Technique Through the Integration of Software Configuration Management and Personal Working Space
Dae Yeob Kim , Cheong Youn The KIPS Transactions:PartD,
Vol. 16, No. 6, pp. 899-910,
Dec.
2009
10.3745/KIPSTD.2009.16.6.899
10.3745/KIPSTD.2009.16.6.899
Traceability of UML Based Test Artifacts Using XML
Kwang Ik Seo , Eun Man Choi The KIPS Transactions:PartD,
Vol. 16, No. 2, pp. 213-222,
Apr.
2009
10.3745/KIPSTD.2009.16.2.213
10.3745/KIPSTD.2009.16.2.213
Requirements Trace Table Expansion and How to Normalization
Ju Young Kim , Rhew Sung Yul The KIPS Transactions:PartD,
Vol. 16, No. 2, pp. 201-212,
Apr.
2009
10.3745/KIPSTD.2009.16.2.201
10.3745/KIPSTD.2009.16.2.201
Rigorous System Testing by Supporting Vertical Traceability
Seo Kwang Ik , Eun Man Choi The KIPS Transactions:PartD,
Vol. 14, No. 7, pp. 753-762,
Dec.
2007
10.3745/KIPSTD.2007.14.7.753
10.3745/KIPSTD.2007.14.7.753
Secure Location Information Protection Scheme from the Network Provider and the third party in Mobile Communication Environments
Kim Sun Seog , Lee Chang Hun The KIPS Transactions:PartC,
Vol. 10, No. 7, pp. 867-878,
Dec.
2003
10.3745/KIPSTC.2003.10.7.867
10.3745/KIPSTC.2003.10.7.867
Study about Component Identification Method Based On RUP
Mi Sook Choi, Yong Ik Yoon, Jai Nyun Park The KIPS Transactions:PartD,
Vol. 9, No. 1, pp. 91-102,
Feb.
2002
10.3745/KIPSTD.2002.9.1.91
10.3745/KIPSTD.2002.9.1.91
Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria
Jisoo Park, Seungjoo Kim KIPS Transactions on Computer and Communication Systems,
Vol. 6, No. 3, pp. 121-134,
Mar.
2017
10.3745/KTCCS.2017.6.3.121
Keywords: SDLC, Threat Modeling, Security Requirements, Traceability
10.3745/KTCCS.2017.6.3.121
Keywords: SDLC, Threat Modeling, Security Requirements, Traceability