Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tamas Visegrady is active.

Publication


Featured researches published by Tamas Visegrady.


Ibm Journal of Research and Development | 2014

Stateless cryptography for virtual environments

Tamas Visegrady; Silvio Dragone; Michael Osborne

Migrating systems onto virtualized environments, such as cloud platforms, is becoming a business imperative. Such platforms offer the promise of higher resilience combined with a relatively low cost of ownership. The platforms also involve a number of challenges that hinder their adoption, and a primary concern involves security. These security concerns stem in part from vulnerabilities that underlying virtualization functionality introduces, such as the ability to capture and replay the execution state of a virtualized machine. In systems where security is paramount, HSMs (hardware security modules) are often used. HSMs provide a tamper-resistant environment for storing sensitive cryptographic material and for executing cryptographic operations using this material. HSMs may appear to be important components for enhancing the security of virtual environments; however, current implementations are not well suited for this purpose. In this paper, we describe a typical HSM solution stack based on the de facto industry standard called PKCS #11 (Public Key Cryptography Standard # 11). We explain the challenges introduced by virtualized platforms and show why the typical architectures based on PKCS #11 are not suitable for such environments. Finally, we describe an alternative IBM HSM solution called EP11 (Enterprise PKCS #11) and show how it addresses many of these challenges.


Archive | 2013

System and method of performing electronic transactions

Michael Baentsch; Reto Hermann; Thorsten Kramp; Thomas D. Weigold; Peter Buhler; Thomas Eirich; Tamas Visegrady


Archive | 2009

Authentication of data communications

Michael Baentsch; Peter Buhler; Thomas Eirich; Thorsten Kramp; Michael Peter Kuyper-Hammond; Michael Osborne; Tamas Visegrady


Archive | 2008

Thin film transistor liquid crystal display barcodes

Michael Peter Kuyper-Hammond; Michael Osborne; Tamas Visegrady


Archive | 2013

Software version management

Michael David Hocker; Michael J. Jordan; Tamas Visegrady; Klaus Werner


Archive | 2007

Protection of Secure Electronic Modules Against Attacks

Carl Ugo Buscaglia; Vincenzo Condorelli; Kevin C. Gotze; Nihad Hadzic; Donald W. Plass; Tamas Visegrady


Archive | 2005

Method of embedding tamper proof layers and discrete components into printed circuit board stack-up

Stefano S. Oggioni; Vincenzo Condorelli; Nihad Hadzic; Kevin C. Gotze; Tamas Visegrady


Archive | 2012

CONCURRENT EMBEDDED APPLICATION UPDATE AND MIGRATION

David H. Evans; David Wayne Glass; Martin Thiim; Tamas Visegrady


Archive | 2010

OPTIMIZING JUST-IN-TIME COMPILATION IN A NETWORK OF NODES

Thorsten Kramp; Tamas Visegrady


Archive | 2009

Communications channel interposer, method and program product for verifying integrity of untrusted subsystem responses to a request

Vincenzo Condorelli; Thomas J. Dewkett; Michael David Hocker; Tamas Visegrady

Researchain Logo
Decentralizing Knowledge