Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John C. Dayka is active.

Publication


Featured researches published by John C. Dayka.


Ibm Journal of Research and Development | 2012

IBM 4765 cryptographic coprocessor

Todd W. Arnold; Carl Ugo Buscaglia; F. Chan; Vincenzo Condorelli; John C. Dayka; W. Santiago-Fernandez; Nihad Hadzic; Michael David Hocker; Michael J. Jordan; T. E. Morris; Klaus Werner

This paper provides an overview of the 4765 cryptographic coprocessor hardware and firmware architecture, its key design features, and an overview of the IBM System z® secure software stack. The hardware for the 4765 solution is shared across all IBM server platforms offering cryptographic hardware acceleration in a highly programmable coprocessor environment designed to meet the most stringent security requirements. Its internal hardware and firmware can be easily updated to meet new security standards and requirements, as well as new customer-specific functionality. It allows updates and customization to be executed with zero downtime, meeting the highest standard of reliability and availability. Standard cryptographic functions and specialized banking and financial functions are supported.


Ibm Systems Journal | 2001

Security on z/OS: comprehensive, current, and flexible

Richard L. Guski; John C. Dayka; Linda N. Distel; Walter B. Farrell; Karen A. Gdaniec; Michael J. Kelly; Mark A. Nelson; Linwood H. Overby; Linwood G. Robinson

In this paper, we summarize and explain the security functions available to a typical enterprise computing installation using the IBM z/OSTM operating system and Security Server. The discussion is at a high level, aimed at enterprise decision makers and application architects. The intent is to explain the comprehensive security componentry within z/OS and to show how these techniques and functions are exploited by modern distributed and Internet applications. Both z/OS and the IBM @® server zSeriesTM product family have a rich heritage and significant presence in the evolving computing marketplace. Consequently, this discussion includes some computer security history and projections of the relevant future.


Archive | 2002

The Security Architecture for Open Grid Services

Nataraj Nagaratnam; Philippe A. Janson; John C. Dayka; Anthony Joseph Nadalin; Frank Siebenlist; Von Welch; Ian T. Foster; Steve Tuecke


Archive | 2002

Authenticated identity translation within a multiple computing unit environment

Patrick S. Botz; John C. Dayka; Richard H. Guski; Timothy J. Hahn; Margaret K. LaBelle


Archive | 1996

Method and apparatus for controlling server access to a resource in a client/server system

Donald F. Ault; John C. Dayka; Eric Charles Finkelstein; Richard H. Guski


Archive | 1997

Method and apparatus for entity authentication and session key generation

Richard H. Guski; John C. Dayka; Harvey McGee; Bruce Robert Wells


Archive | 2003

Implementation and use of a PII data access control facility employing personally identifying information labels and purpose serving functions sets

Linda N. Betz; John C. Dayka; Walter B. Farrell; Richard H. Guski; Guenter Karjoth; Mark A. Nelson; Birgit Pfitzmann; Matthias Schunter; Michael Waidner


Archive | 2006

Authenticated identity propagation and translation within a multiple computing unit environment

Patrick S. Botz; John C. Dayka; Donna N. Dillenberger; Richard H. Guski; Timothy J. Hahn; Margaret K. LaBelle; Mark A. Nelson


Archive | 2001

Password exposure elimination for digital signature coupling with a host identity

Thomas L. Gindin; Messaoud Benantar; James W. Sweeny; John C. Dayka


Archive | 2006

Encrypted tape access control via challenge-response protocol

Steven A. Bade; John C. Dayka; Glen Alan Jaquette; Richard H. Guski

Researchain Logo
Decentralizing Knowledge