Follow
Jim Whitmore
Jim Whitmore
Security Engineering Research
Verified email at ieee.org
Title
Cited by
Cited by
Year
Automated risk assessments using a contextual data model that correlates physical and logical assets
JJ Whitmore
US Patent 8,150,717, 2012
2982012
A method for designing secure solutions
JJ Whitmore
IBM systems Journal 40 (3), 747-768, 2001
702001
Intelligent service management and process control using policy-based automation and predefined task templates
JJ Whitmore
US Patent 9,436,921, 2016
382016
System integrity manager
J Whitmore
US Patent App. 11/161,905, 2007
362007
Method and system for architecting a secure solution
AM Gilbert, JJ Whitmore
US Patent 7,251,831, 2007
322007
Introducing the IBM security framework and IBM security blueprint to realize business-driven security
A Buecker, M Borrett, C Lorenz, C Powers
IBM Redpaper 4528 (1), 1-96, 2010
262010
Deploying a public key infrastructure
H Johner, S Fujiwara, AS Yeung, A Stephanou, J Whitmore
IBM, 2000
162000
System and method for designing secure business solutions using patterns
JJ Whitmore
US Patent 8,725,521, 2014
152014
Enterprise Security Architecture Using IBM Tivoli Security Solutions
A Buecker, AV Carreno, N Field, C Hockings, D Kawer, S Mohanty, ...
IBM Redbooks, 2007
142007
Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
A Buecker, S Arunkumar, B Blackshaw, M Borrett, P Brittenham, J Flegr, ...
IBM Redbooks, 2014
122014
Software protection using an installation product having an entitlement file
TJ Hahn, BP Palmer, MP Waidner, JJ Whitmore
US Patent 9,946,848, 2018
102018
Threat analysis in the software development lifecycle
J Whitmore, S Türpe, S Triller, A Poller, C Carlson
IBM Journal of Research and Development 58 (1), 6: 1-6: 13, 2014
102014
Improving Attention to Security in Software Design with Analytics and Cognitive Techniques
J Whitmore, W Tobin
2017 IEEE Cybersecurity Development, 16-21, 2017
82017
Providing consistent cryptographic operations across several applications
PMR Almandos, EM Coria, MC Lanza, G Manzato, MA Prediletto, ...
US Patent 9,009,473, 2015
72015
Software protection using an installation product having an entitlement file
TJ Hahn, BP Palmer, MP Waidner, JJ Whitmore
US Patent 9,898,587, 2018
62018
Providing consistent cryptographic operations
JA Cerruti, MC Lanza, G Manzato, MA Prediletto, JJ Whitmore
US Patent 9,009,472, 2015
52015
Security in development: The IBM secure engineering framework
D Allan, T Hahn, A Szakal, J Whitmore, A Buecker
IBM Corporation, 2010
52010
Policy-Based Automation in the Autonomic Data Center
D Kaminsky, B Miller, A Salahshour, J Whitmore
2008 International Conference on Autonomic Computing, 209-210, 2008
42008
Software protection using an installation product having an entitlement file
TJ Hahn, BP Palmer, MP Waidner, JJ Whitmore
US Patent 10,068,064, 2018
32018
Security and e-business: Is There a Prescription?
J Whitmore
21st National Information Systems Security Conference, Arlington, Virginia …, 1998
31998
The system can't perform the operation now. Try again later.
Articles 1–20