Ritesh Kumar Tiwari

Learn More
The growing possibilities of modern communication need the special means of security especially on computer network. Data security in the last few years has gained a wider audience. In this paper we have discussed a new steganographic technique based on the file hybridization. In contrast to other methods of steganography where data embedding in image work(More)
Security policy satisfiability and high failure resilience (i.e. survivabil-ity) are desirable properties of every system. Security issues and failure resilience are usually treated in stand alone mode and not in synergy. In this paper, we bridge this gap for workflows. We propose techniques which ensure that user-task assignment is both secure and failure(More)
  • Rituraj Rusia, R K Tiwari, Munendra Kumar Mishra
  • 2014
— In today's information age, information sharing and transfer has increased exponentially. The information must be vulnerable and protected to unauthorised access and interception. With the development of network techniques the problem of network security becomes more and more important during storage and transmission of data. This paper introduces the(More)
In this work we look into the domain of process security from a service perspective. Most often process security has been enacted through service level agreements (SLA) and business agreements. However, in a multi-party environment such as business process outsourcing (BPO) where processes themselves are offered as a service, the qualitative nature of SLA(More)
No part of this publication can be reproduced in any form or by any means without the prior written permission from CSI. The opinion expressed and figures provided in the COMAD-2008 proceedings are the sole responsibility of the authors. The publishers and the editors bear no responsibility in this regard. PREFACE The International Conference on Management(More)
  • 1