{"id":"https://openalex.org/W2088988646","doi":"https://doi.org/10.1147/jrd.2013.2287811","title":"Stateless cryptography for virtual environments","display_name":"Stateless cryptography for virtual environments","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2088988646","doi":"https://doi.org/10.1147/jrd.2013.2287811","mag":"2088988646"},"language":"en","primary_location":{"id":"doi:10.1147/jrd.2013.2287811","is_oa":false,"landing_page_url":"https://doi.org/10.1147/jrd.2013.2287811","pdf_url":null,"source":{"id":"https://openalex.org/S4210219925","display_name":"IBM Journal of Research and Development","issn_l":"0018-8646","issn":["0018-8646","2151-8556"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320652","host_organization_name":"IBM","host_organization_lineage":["https://openalex.org/P4310320652"],"host_organization_lineage_names":["IBM"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IBM Journal of Research and Development","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014135784","display_name":"T. Visegrady","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"T. Visegrady","raw_affiliation_strings":["IBM Research Division, Z\u00fcrich Research Center, R\u00fcschlikon, Switzerland","IBM Research Division, Z\u00fcrich Research Center, R\u00fcschlikon, Switzerland#TAB#"],"affiliations":[{"raw_affiliation_string":"IBM Research Division, Z\u00fcrich Research Center, R\u00fcschlikon, Switzerland","institution_ids":["https://openalex.org/I4210126328"]},{"raw_affiliation_string":"IBM Research Division, Z\u00fcrich Research Center, R\u00fcschlikon, Switzerland#TAB#","institution_ids":["https://openalex.org/I4210126328"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063247417","display_name":"Silvio Dragone","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"S. Dragone","raw_affiliation_strings":["IBM Research Division, Z\u00fcrich Research Center, R\u00fcschlikon, Switzerland","IBM Research Division, Z\u00fcrich Research Center, R\u00fcschlikon, Switzerland#TAB#"],"affiliations":[{"raw_affiliation_string":"IBM Research Division, Z\u00fcrich Research Center, R\u00fcschlikon, Switzerland","institution_ids":["https://openalex.org/I4210126328"]},{"raw_affiliation_string":"IBM Research Division, Z\u00fcrich Research Center, R\u00fcschlikon, Switzerland#TAB#","institution_ids":["https://openalex.org/I4210126328"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020779219","display_name":"Michael Osborne","orcid":"https://orcid.org/0000-0002-0281-8864"},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"M. Osborne","raw_affiliation_strings":["IBM Research Division, Z\u00fcrich Research Center, R\u00fcschlikon, Switzerland","IBM Research Division, Z\u00fcrich Research Center, R\u00fcschlikon, Switzerland#TAB#"],"affiliations":[{"raw_affiliation_string":"IBM Research Division, Z\u00fcrich Research Center, R\u00fcschlikon, Switzerland","institution_ids":["https://openalex.org/I4210126328"]},{"raw_affiliation_string":"IBM Research Division, Z\u00fcrich Research Center, R\u00fcschlikon, Switzerland#TAB#","institution_ids":["https://openalex.org/I4210126328"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5014135784"],"corresponding_institution_ids":["https://openalex.org/I4210126328"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.103772,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"58","issue":"1","first_page":"5:1","last_page":"5:10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7147049903869629},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.6185754537582397},{"id":"https://openalex.org/keywords/ibm","display_name":"IBM","score":0.5978250503540039},{"id":"https://openalex.org/keywords/stateless-protocol","display_name":"Stateless protocol","score":0.5890442728996277},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5802307724952698},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5655583739280701},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4563584327697754},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.39655372500419617},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3081050515174866},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.11558696627616882}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7147049903869629},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.6185754537582397},{"id":"https://openalex.org/C70388272","wikidata":"https://www.wikidata.org/wiki/Q5968558","display_name":"IBM","level":2,"score":0.5978250503540039},{"id":"https://openalex.org/C103613024","wikidata":"https://www.wikidata.org/wiki/Q230924","display_name":"Stateless protocol","level":3,"score":0.5890442728996277},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5802307724952698},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5655583739280701},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4563584327697754},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.39655372500419617},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3081050515174866},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.11558696627616882},{"id":"https://openalex.org/C171250308","wikidata":"https://www.wikidata.org/wiki/Q11468","display_name":"Nanotechnology","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1147/jrd.2013.2287811","is_oa":false,"landing_page_url":"https://doi.org/10.1147/jrd.2013.2287811","pdf_url":null,"source":{"id":"https://openalex.org/S4210219925","display_name":"IBM Journal of Research and Development","issn_l":"0018-8646","issn":["0018-8646","2151-8556"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320652","host_organization_name":"IBM","host_organization_lineage":["https://openalex.org/P4310320652"],"host_organization_lineage_names":["IBM"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IBM Journal of Research and Development","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5899999737739563,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W50107694","https://openalex.org/W1514302123","https://openalex.org/W1558464214","https://openalex.org/W1594470276","https://openalex.org/W1992291252","https://openalex.org/W2077836579","https://openalex.org/W2165148376","https://openalex.org/W2407063206","https://openalex.org/W3150881812","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W3040374273","https://openalex.org/W2955572513","https://openalex.org/W4360604845","https://openalex.org/W151293476","https://openalex.org/W2036359834","https://openalex.org/W2116712504","https://openalex.org/W3130948357","https://openalex.org/W2806284780","https://openalex.org/W4231088008","https://openalex.org/W4388857716"],"abstract_inverted_index":{"Migrating":[0],"systems":[1,77],"onto":[2],"virtualized":[3,74,163],"environments,":[4],"such":[5,61,179],"as":[6,62],"cloud":[7],"platforms,":[8],"is":[9,80],"becoming":[10],"a":[11,24,34,43,73,91,136],"business":[12],"imperative.":[13],"Such":[14],"platforms":[15,31,164],"offer":[16],"the":[17,63,69,116,143,159,168],"promise":[18],"of":[19,28,36,72,118,200],"higher":[20],"resilience":[21],"combined":[22],"with":[23],"relatively":[25],"low":[26],"cost":[27],"ownership.":[29],"The":[30],"also":[32],"involve":[33],"number":[35],"challenges":[37,160],"that":[38,56],"hinder":[39],"their":[40],"adoption,":[41],"and":[42,67,99,165,194],"primary":[44],"concern":[45],"involves":[46],"security.":[47],"These":[48],"security":[49,79,84,117],"concerns":[50],"stem":[51],"in":[52],"part":[53],"from":[54],"vulnerabilities":[55],"underlying":[57],"virtualization":[58],"functionality":[59],"introduces,":[60],"ability":[64],"to":[65,110],"capture":[66],"replay":[68],"execution":[70],"state":[71],"machine.":[75],"In":[76,131],"where":[78],"paramount,":[81],"HSMs":[82,89,107],"(hardware":[83],"modules)":[85],"are":[86,124,175],"often":[87],"used.":[88],"provide":[90],"tamper-resistant":[92],"environment":[93],"for":[94,100,114,128,178],"storing":[95],"sensitive":[96],"cryptographic":[97,102],"material":[98],"executing":[101],"operations":[103],"using":[104],"this":[105,129,132],"material.":[106],"may":[108],"appear":[109],"be":[111],"important":[112],"components":[113],"enhancing":[115],"virtual":[119],"environments;":[120],"however,":[121],"current":[122],"implementations":[123],"not":[125,176],"well":[126],"suited":[127],"purpose.":[130],"paper,":[133],"we":[134,182],"describe":[135,183],"typical":[137,169],"HSM":[138,187],"solution":[139,188],"stack":[140],"based":[141,171],"on":[142,172],"de":[144],"facto":[145],"industry":[146],"standard":[147],"called":[148,189],"PKCS":[149,173,192],"#11":[150,174],"(Public":[151],"Key":[152],"Cryptography":[153],"Standard":[154],"#":[155],"11).":[156],"We":[157],"explain":[158],"introduced":[161],"by":[162],"show":[166,195],"why":[167],"architectures":[170],"suitable":[177],"environments.":[180],"Finally,":[181],"an":[184],"alternative":[185],"IBM":[186],"EP11":[190],"(Enterprise":[191],"#11)":[193],"how":[196],"it":[197],"addresses":[198],"many":[199],"these":[201],"challenges.":[202]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
