{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T15:08:38Z","timestamp":1759072118138,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2568225.2568290","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"943-954","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["Mind the gap: assessing the conformance of software traceability to relevant guidelines"],"prefix":"10.1145","author":[{"given":"Patrick","family":"Rempel","sequence":"first","affiliation":[{"name":"TU Ilmenau, Germany"}]},{"given":"Patrick","family":"M\u00e4der","sequence":"additional","affiliation":[{"name":"TU Ilmenau, Germany"}]},{"given":"Tobias","family":"Kuschke","sequence":"additional","affiliation":[{"name":"TU Ilmenau, Germany"}]},{"given":"Jane","family":"Cleland-Huang","sequence":"additional","affiliation":[{"name":"DePaul University, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/646198.681808"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.63"},{"key":"e_1_3_2_1_3_1","volume-title":"Licensing of safety critical software for nuclear reactors \u2013 common position of seven european nuclear regulators and authorised technical support organisations","author":"L-V","year":"2013","unstructured":"BE L-V , BfS, CSN, ISTec, ONR, SSM, STUK. Licensing of safety critical software for nuclear reactors \u2013 common position of seven european nuclear regulators and authorised technical support organisations , 2013 . BEL-V, BfS, CSN, ISTec, ONR, SSM, STUK. Licensing of safety critical software for nuclear reactors \u2013 common position of seven european nuclear regulators and authorised technical support organisations, 2013."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEFSE.2013.6620158"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37422-7_12"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.001"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37422-7_11"},{"key":"e_1_3_2_1_8_1","first-page":"23","volume-title":"Proc. of the 21st IEEE International Requirements Engineering Conference (RE), Rio de Janeiro","author":"Breaux T. D.","unstructured":"T. D. Breaux and A. Rao . Formal analysis of privacy requirements specifications for multi-tier applications . In Proc. of the 21st IEEE International Requirements Engineering Conference (RE), Rio de Janeiro , Brasil , pages 14\u2013 23 . IEEE, 2013. T. D. Breaux and A. Rao. Formal analysis of privacy requirements specifications for multi-tier applications. In Proc. of the 21st IEEE International Requirements Engineering Conference (RE), Rio de Janeiro, Brasil, pages 14\u201323. IEEE, 2013."},{"key":"e_1_3_2_1_9_1","volume-title":"Springer","author":"Caffery F. M.","year":"2011","unstructured":"F. M. Caffery , V. Casey , M. Sivakumar , G. Coleman , P. Donnelly , and J. Burton . Software and Systems Traceability, chapter Medical Device Software Traceability, pages 321\u2013339 . Springer , 2011 . F. M. Caffery, V. Casey, M. Sivakumar, G. Coleman, P. Donnelly, and J. Burton. Software and Systems Traceability, chapter Medical Device Software Traceability, pages 321\u2013339. Springer, 2011."},{"volume-title":"Common criteria for information technology security evaluation: Part 1: Introduction and general model, v3.1 r1","year":"2006","key":"e_1_3_2_1_10_1","unstructured":"CCMB-2006-09-001 : Common criteria for information technology security evaluation: Part 1: Introduction and general model, v3.1 r1 , 2006 . CCMB-2006-09-001: Common criteria for information technology security evaluation: Part 1: Introduction and general model, v3.1 r1, 2006."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593891"},{"key":"e_1_3_2_1_12_1","unstructured":"CoEST: Center of excellence for software traceability http:\/\/www.CoEST.org.  CoEST: Center of excellence for software traceability http:\/\/www.CoEST.org."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2009.1576"},{"key":"e_1_3_2_1_14_1","volume-title":"developer.connectopensource.org","author":"CONNECT","year":"2013","unstructured":"CONNECT , developer.connectopensource.org , 2013 . CONNECT, developer.connectopensource.org, 2013."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/304399.304401"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41533-3_5"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89247-2_6"},{"key":"e_1_3_2_1_18_1","volume-title":"Continuous Integration: Improving Software Quality and Reducing Risk","author":"Duvall P.","year":"2007","unstructured":"P. Duvall , S. Matyas , and A. Glover . Continuous Integration: Improving Software Quality and Reducing Risk . Addison-Wesley , 2007 . P. Duvall, S. Matyas, and A. Glover. Continuous Integration: Improving Software Quality and Reducing Risk. Addison-Wesley, 2007."},{"key":"e_1_3_2_1_19_1","volume-title":"ECSS-E-40C: principles and requirements applicable to space software engineering","author":"ECSS.","year":"2009","unstructured":"ECSS. ECSS-E-40C: principles and requirements applicable to space software engineering , 2009 . ECSS. ECSS-E-40C: principles and requirements applicable to space software engineering, 2009."},{"key":"e_1_3_2_1_20_1","volume-title":"The TOPCASED project: a toolkit in open source for critical aeronautic systems design. Ingenieurs de l\u2019Automobile, 1(781):54\u201359","author":"Farail P.","year":"2006","unstructured":"P. Farail , P. Goutillet , A. Canals , C. Le Camus , D. Sciamma , P. Michel , X. Cr\u00e9gut , and M. Pantel . The TOPCASED project: a toolkit in open source for critical aeronautic systems design. Ingenieurs de l\u2019Automobile, 1(781):54\u201359 , 2006 . P. Farail, P. Goutillet, A. Canals, C. Le Camus, D. Sciamma, P. Michel, X. Cr\u00e9gut, and M. Pantel. The TOPCASED project: a toolkit in open source for critical aeronautic systems design. Ingenieurs de l\u2019Automobile, 1(781):54\u201359, 2006."},{"key":"e_1_3_2_1_21_1","volume-title":"General Principles of Software Validation","author":"Food and Drug Administration","year":"2002","unstructured":"Food and Drug Administration . General Principles of Software Validation ; Final Guidance for Industry and FDA Staff , 2002 . Food and Drug Administration. General Principles of Software Validation; Final Guidance for Industry and FDA Staff, 2002."},{"volume-title":"gforge.enseeiht.fr\/projects\/geneauto","year":"2013","key":"e_1_3_2_1_22_1","unstructured":"Gene-Auto , gforge.enseeiht.fr\/projects\/geneauto , 2013 . Gene-Auto, gforge.enseeiht.fr\/projects\/geneauto, 2013."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-013-0167-6"},{"key":"e_1_3_2_1_24_1","first-page":"22","volume-title":"Software and Systems Traceability","author":"Gotel O.","unstructured":"O. Gotel , J. Cleland-Huang , J. Hayes , A. Zisman , A. Egyed , P. Gr\u00fcnbacher , A. Dekhtyar , G. Antoniol , J. Maletic , and P. M\u00e4der . Traceability fundamentals . In J. Cleland-Huang, O. Gotel, and A. Zisman, editors, Software and Systems Traceability , pages 3\u2013 22 . Springer London, 2012. O. Gotel, J. Cleland-Huang, J. Hayes, A. Zisman, A. Egyed, P. Gr\u00fcnbacher, A. Dekhtyar, G. Antoniol, J. Maletic, and P. M\u00e4der. Traceability fundamentals. In J. Cleland-Huang, O. Gotel, and A. Zisman, editors, Software and Systems Traceability, pages 3\u201322. Springer London, 2012."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/827255.827842"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1994.292398"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8153-7_11"},{"volume-title":"svn.assembla.com\/svn\/HITTeam","year":"2013","key":"e_1_3_2_1_28_1","unstructured":"Health Care Protocol Translator (HCPT) , svn.assembla.com\/svn\/HITTeam , 2013 . Health Care Protocol Translator (HCPT), svn.assembla.com\/svn\/HITTeam, 2013."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.42"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.46"},{"key":"e_1_3_2_1_31_1","volume-title":"Product development at the software level","author":"SO.","year":"2011","unstructured":"I SO. ISO:26262-6:2011 Road vehicles - functional safety - part 6 : Product development at the software level , 2011 . ISO. ISO:26262-6:2011 Road vehicles - functional safety - part 6: Product development at the software level, 2011."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2012.80"},{"key":"e_1_3_2_1_33_1","volume-title":"CSDM-Poster","author":"Katta V.","year":"2010","unstructured":"V. Katta and T. Stalhane . A conceptual model of traceability for safety systems . In CSDM-Poster , 2010 . V. Katta and T. Stalhane. A conceptual model of traceability for safety systems. In CSDM-Poster, 2010."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/67544.66939"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/210332.210335"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2013.55"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEFSE.2009.5069578"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2009.23"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2013.60"},{"key":"e_1_3_2_1_40_1","volume-title":"A refined production rule model for aiding in regulatory compliance. Technical report","author":"Maxwell J. C.","year":"2010","unstructured":"J. C. Maxwell and A. I. Anton . A refined production rule model for aiding in regulatory compliance. Technical report , North Carolina State University. Department of Computer Science , 2010 . J. C. Maxwell and A. I. Anton. A refined production rule model for aiding in regulatory compliance. Technical report, North Carolina State University. Department of Computer Science, 2010."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.01.005"},{"key":"e_1_3_2_1_42_1","volume-title":"www.open-do.org","author":"Initiative DO","year":"2013","unstructured":"The Open- DO Initiative , www.open-do.org , 2013 . The Open-DO Initiative, www.open-do.org, 2013."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2011.11"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772643.1772647"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/290133.290147"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.895989"},{"volume-title":"www.chris-edwards.org\/340","year":"2013","key":"e_1_3_2_1_47_1","unstructured":"Rate Adjustment by Managing Inflows (RAMI) , www.chris-edwards.org\/340 , 2013 . Rate Adjustment by Managing Inflows (RAMI), www.chris-edwards.org\/340, 2013."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2013.6636719"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37422-7_10"},{"key":"e_1_3_2_1_50_1","volume-title":"Software considerations in airborne systems and equipment certification","author":"AE.","year":"2000","unstructured":"RTCA\/EUROC AE. DO-178B\/ED-12B : Software considerations in airborne systems and equipment certification , 2000 . RTCA\/EUROCAE. DO-178B\/ED-12B: Software considerations in airborne systems and equipment certification, 2000."},{"volume-title":"secureaudit.sourceforge.net","year":"2013","key":"e_1_3_2_1_51_1","unstructured":"Secure Auditing for Linux (SAL) , secureaudit.sourceforge.net , 2013 . Secure Auditing for Linux (SAL), secureaudit.sourceforge.net, 2013."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.149"},{"key":"e_1_3_2_1_53_1","volume-title":"www.topcased.org","author":"ASED","year":"2013","unstructured":"TOPC ASED the open-source toolkit for critical systems , www.topcased.org , 2013 . TOPCASED the open-source toolkit for critical systems, www.topcased.org, 2013."},{"volume-title":"http:\/\/flora.sourceforge.net","year":"2013","key":"e_1_3_2_1_54_1","unstructured":"Flora-2 , http:\/\/flora.sourceforge.net , 2013 . Flora-2, http:\/\/flora.sourceforge.net, 2013."},{"volume-title":"gforge.enseeiht.fr\/projects\/topcased-req","year":"2013","key":"e_1_3_2_1_55_1","unstructured":"TOPCASED-REQ , gforge.enseeiht.fr\/projects\/topcased-req , 2013 . TOPCASED-REQ, gforge.enseeiht.fr\/projects\/topcased-req, 2013."},{"volume-title":"gforge.enseeiht.fr\/projects\/topcased-sam","year":"2013","key":"e_1_3_2_1_56_1","unstructured":"TOPCASED-SAM , gforge.enseeiht.fr\/projects\/topcased-sam , 2013 . TOPCASED-SAM, gforge.enseeiht.fr\/projects\/topcased-sam, 2013."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxm021"}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."],"location":"Hyderabad India","acronym":"ICSE '14"},"container-title":["Proceedings of the 36th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568225.2568290","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2568225.2568290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:30Z","timestamp":1750234230000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568225.2568290"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":57,"alternative-id":["10.1145\/2568225.2568290","10.1145\/2568225"],"URL":"https:\/\/doi.org\/10.1145\/2568225.2568290","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}