Back
 IJCNS  Vol.7 No.10 , October 2014
Virtualization Security, Strategy and Management
Abstract: The purpose of this quantitative study was to determine the relationship between the security management framework of organizations and the security condition of the virtualized environment.
Cite this paper: Tran, S. and Gold, S. (2014) Virtualization Security, Strategy and Management. International Journal of Communications, Network and System Sciences, 7, 423-429. doi: 10.4236/ijcns.2014.710043.
References

[1]   Neiger, G., Santoni, A., Leung, F. and Rodgers, D. (2006) Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization. Intel Technology Journal, 10, 167.
http://dx.doi.org/10.1535/itj

[2]   Neuman, L.W. (2006) Social Research Methods: Qualitative and Quantitative Approaches. 6th Editon, Allyn and Bacon, Boston.

[3]   Nikhil, B. (2009) Performance Evaluation of Intel EPT Hardware Assist. VMware, Inc., California. http://www.vmware.com

[4]   Nikitasha, P., Jyotiprakash, S., Subasish, M. and Prasanna, P.S. (2011) A Security Framework for Virtualization Based Computing Environment. International Journal of Engineering Science and Technology, 3, 6423-6429. http://www.techrepublic.com/research-library

[5]   Park, Y.R. and Sharma, S. (2009) Providing Service Using a Virtualization Infrastructure. Journal of Service Science, 2, 17-22. http://search.proquest.com/docview/195627357?accountid=35812

[6]   Payne, B.D. (2010) Improving Host-Based Computer Security Using Secure Active Monitoring and Memory Analysis. Georgia Institute of Technology, Atlanta. http://www.bryanpayne.org/

[7]   Peng, Q. and Yu, C. (2007) Enhanced Integrated Manufacturing Systems in an Immersive Virtual Environment. Proceedings of the Institution of Mechanical Engineers, 221, 477-487.
http://search.proquest.com/docview/195146511?accountid=35812
http://dx.doi.org/10.1243/09544054JEM453

[8]   Perkins, G.H. (2004) Will Libraries’ Web-Based Survey Methods Replace Existing Nonelectronic Survey Methods. Information Technology and Libraries, 23, 123-126.

[9]   Petter, S., Delone, W. and McLean, E. (2008) Measuring Information Systems Success: Models, Dimensions, Measures, and Interrelationships. European Journal of Information Systems, 17, 236-263. http://www.palgrave-journals.com http://dx.doi.org/10.1057/ejis.2008.15

[10]   Pozgaj, Z. and Strahonja, J. (2008) It Service Management Based on Itil Methodology. 965-978. http://search.proquest.com/docview/217738441?accountid=35812

[11]   Prism MicroSystems (2010) 2010 State of Virtualization Security Survey.
http://www.prismmicrosys.com/documents/VirtualizationSecuritySurvey2010.pdf

[12]   Reichman, A. (2009) Rethinking Storage for Server Virtualization Environments. TechTarget.
http://searchservervirtualization.techtarget.com

[13]   Rosnow, R.L. and Rosenthal, R. (2008) Beginning Behavioral Research: A Conceptual Primer. 6th Edition, Pearson Prentice Hall, Upper Saddle River.

[14]   RSA List Service (2012) Fortune 1000 Company List. http://www.rsalistsinc.com

[15]   Samoilenko, S. (2008) Information Systems Fitness and Risk in IS Development: Insights and Implications from Chaos and Complex Systems Theories. Information Systems Frontiers, 10, 281-292. http://dx.doi.org/10.1007/s10796-008-9078-3

[16]   Sandifer, C. (2008) The Economics of Virtualization. University of South Carolina, Columbia. http://search.proquest.com

[17]   Scadden, R., Bogdany, R., Clifford, J., Pearthree, H. and Locke, R. (2008) Resilient Hosting in a Continuously Available Virtualized Environment. IBM Systems Journal, 47, 535-548.
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5386523
http://dx.doi.org/10.1147/SJ.2008.5386523

[18]   Seiler, S. and Pfister, A.C. (2009) Why Did I Do This: Understanding Leadership Behavior through a Dynamic Five-Factor Model of Leadership? Journal of Leadership Studies, 3, 41-52.
http://dx.doi.org/10.1002/jls.20122

 
 
Top