Anshu Tripathi

Learn More
This Paper provides Proactive share key refreshing technique for maintaining the security of the system, even when some nodes are in control of attacker. It provides an automated recovery of the security of individual components, avoiding the use of expensive and inconvenient manual processes. The technique can be used with threshold cryptography, by(More)
The research work presented here includes reengineering needs and process framework. It also includes various works that has been done in the field of extraction of business rules from legacy C++ source code. Therefore, here proposed method is implemented to extract a business rule from legacy C++ source code. Here we can extract(More)
One of the major problem in information system security assessment is lack of standard vulnerability categorization scheme or taxonomy. Various analyses indicated that majority of software vulnerabilities tend to focus in few areas and associated with small set of services. An effective vulnerability taxonomy that can relate vulnerability causes, effects(More)
Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount of effort is devoted by software developers on this issue. In the world of software one cannot get rid of the bugs, fixes, patches etc. each of them have a severity and priority associated to it. There is not yet any formal relation between these components as(More)
— Security is an important issue for networks, especially for those security-sensitive applications. In the entire environment of security, it is necessary to ensure privacy. This Paper provides share key refreshing technique for maintaining the security of the system, even when some nodes are in control of attacker. It provides an automated recovery of the(More)
Security is often viewed as an arms race between attackers, who try to exploit vulnerabilities and security administrators, who try to protect system against these attacks. In this regard, analysis of emerging security trends can be helpful in planning proper countermeasures to ensure security. Several studies and surveys exist that provide statistical(More)
  • 1