John C. Dayka
IBM
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by John C. Dayka.
Ibm Journal of Research and Development | 2012
Todd W. Arnold; Carl Ugo Buscaglia; F. Chan; Vincenzo Condorelli; John C. Dayka; W. Santiago-Fernandez; Nihad Hadzic; Michael David Hocker; Michael J. Jordan; T. E. Morris; Klaus Werner
This paper provides an overview of the 4765 cryptographic coprocessor hardware and firmware architecture, its key design features, and an overview of the IBM System z® secure software stack. The hardware for the 4765 solution is shared across all IBM server platforms offering cryptographic hardware acceleration in a highly programmable coprocessor environment designed to meet the most stringent security requirements. Its internal hardware and firmware can be easily updated to meet new security standards and requirements, as well as new customer-specific functionality. It allows updates and customization to be executed with zero downtime, meeting the highest standard of reliability and availability. Standard cryptographic functions and specialized banking and financial functions are supported.
Ibm Systems Journal | 2001
Richard L. Guski; John C. Dayka; Linda N. Distel; Walter B. Farrell; Karen A. Gdaniec; Michael J. Kelly; Mark A. Nelson; Linwood H. Overby; Linwood G. Robinson
In this paper, we summarize and explain the security functions available to a typical enterprise computing installation using the IBM z/OSTM operating system and Security Server. The discussion is at a high level, aimed at enterprise decision makers and application architects. The intent is to explain the comprehensive security componentry within z/OS and to show how these techniques and functions are exploited by modern distributed and Internet applications. Both z/OS and the IBM @® server zSeriesTM product family have a rich heritage and significant presence in the evolving computing marketplace. Consequently, this discussion includes some computer security history and projections of the relevant future.
Archive | 2002
Nataraj Nagaratnam; Philippe A. Janson; John C. Dayka; Anthony Joseph Nadalin; Frank Siebenlist; Von Welch; Ian T. Foster; Steve Tuecke
Archive | 2002
Patrick S. Botz; John C. Dayka; Richard H. Guski; Timothy J. Hahn; Margaret K. LaBelle
Archive | 1996
Donald F. Ault; John C. Dayka; Eric Charles Finkelstein; Richard H. Guski
Archive | 1997
Richard H. Guski; John C. Dayka; Harvey McGee; Bruce Robert Wells
Archive | 2003
Linda N. Betz; John C. Dayka; Walter B. Farrell; Richard H. Guski; Guenter Karjoth; Mark A. Nelson; Birgit Pfitzmann; Matthias Schunter; Michael Waidner
Archive | 2006
Patrick S. Botz; John C. Dayka; Donna N. Dillenberger; Richard H. Guski; Timothy J. Hahn; Margaret K. LaBelle; Mark A. Nelson
Archive | 2001
Thomas L. Gindin; Messaoud Benantar; James W. Sweeny; John C. Dayka
Archive | 2006
Steven A. Bade; John C. Dayka; Glen Alan Jaquette; Richard H. Guski