A method for designing secure solutions | IBM Journals & Magazine | IEEE Xplore