Automated risk assessments using a contextual data model that correlates physical and logical assets JJ Whitmore US Patent 8,150,717, 2012 | 298 | 2012 |
A method for designing secure solutions JJ Whitmore IBM systems Journal 40 (3), 747-768, 2001 | 70 | 2001 |
Intelligent service management and process control using policy-based automation and predefined task templates JJ Whitmore US Patent 9,436,921, 2016 | 38 | 2016 |
System integrity manager J Whitmore US Patent App. 11/161,905, 2007 | 36 | 2007 |
Method and system for architecting a secure solution AM Gilbert, JJ Whitmore US Patent 7,251,831, 2007 | 32 | 2007 |
Introducing the IBM security framework and IBM security blueprint to realize business-driven security A Buecker, M Borrett, C Lorenz, C Powers IBM Redpaper 4528 (1), 1-96, 2010 | 26 | 2010 |
Deploying a public key infrastructure H Johner, S Fujiwara, AS Yeung, A Stephanou, J Whitmore IBM, 2000 | 16 | 2000 |
System and method for designing secure business solutions using patterns JJ Whitmore US Patent 8,725,521, 2014 | 15 | 2014 |
Enterprise Security Architecture Using IBM Tivoli Security Solutions A Buecker, AV Carreno, N Field, C Hockings, D Kawer, S Mohanty, ... IBM Redbooks, 2007 | 14 | 2007 |
Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security A Buecker, S Arunkumar, B Blackshaw, M Borrett, P Brittenham, J Flegr, ... IBM Redbooks, 2014 | 12 | 2014 |
Software protection using an installation product having an entitlement file TJ Hahn, BP Palmer, MP Waidner, JJ Whitmore US Patent 9,946,848, 2018 | 10 | 2018 |
Threat analysis in the software development lifecycle J Whitmore, S Türpe, S Triller, A Poller, C Carlson IBM Journal of Research and Development 58 (1), 6: 1-6: 13, 2014 | 10 | 2014 |
Improving Attention to Security in Software Design with Analytics and Cognitive Techniques J Whitmore, W Tobin 2017 IEEE Cybersecurity Development, 16-21, 2017 | 8 | 2017 |
Providing consistent cryptographic operations across several applications PMR Almandos, EM Coria, MC Lanza, G Manzato, MA Prediletto, ... US Patent 9,009,473, 2015 | 7 | 2015 |
Software protection using an installation product having an entitlement file TJ Hahn, BP Palmer, MP Waidner, JJ Whitmore US Patent 9,898,587, 2018 | 6 | 2018 |
Providing consistent cryptographic operations JA Cerruti, MC Lanza, G Manzato, MA Prediletto, JJ Whitmore US Patent 9,009,472, 2015 | 5 | 2015 |
Security in development: The IBM secure engineering framework D Allan, T Hahn, A Szakal, J Whitmore, A Buecker IBM Corporation, 2010 | 5 | 2010 |
Policy-Based Automation in the Autonomic Data Center D Kaminsky, B Miller, A Salahshour, J Whitmore 2008 International Conference on Autonomic Computing, 209-210, 2008 | 4 | 2008 |
Software protection using an installation product having an entitlement file TJ Hahn, BP Palmer, MP Waidner, JJ Whitmore US Patent 10,068,064, 2018 | 3 | 2018 |
Security and e-business: Is There a Prescription? J Whitmore 21st National Information Systems Security Conference, Arlington, Virginia …, 1998 | 3 | 1998 |