IJCNS  Vol.7 No.10 , October 2014
Virtualization Security, Strategy and Management
Abstract: The purpose of this quantitative study was to determine the relationship between the security management framework of organizations and the security condition of the virtualized environment.
Cite this paper: Tran, S. and Gold, S. (2014) Virtualization Security, Strategy and Management. International Journal of Communications, Network and System Sciences, 7, 423-429. doi: 10.4236/ijcns.2014.710043.

[1]   Neiger, G., Santoni, A., Leung, F. and Rodgers, D. (2006) Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization. Intel Technology Journal, 10, 167.

[2]   Neuman, L.W. (2006) Social Research Methods: Qualitative and Quantitative Approaches. 6th Editon, Allyn and Bacon, Boston.

[3]   Nikhil, B. (2009) Performance Evaluation of Intel EPT Hardware Assist. VMware, Inc., California.

[4]   Nikitasha, P., Jyotiprakash, S., Subasish, M. and Prasanna, P.S. (2011) A Security Framework for Virtualization Based Computing Environment. International Journal of Engineering Science and Technology, 3, 6423-6429.

[5]   Park, Y.R. and Sharma, S. (2009) Providing Service Using a Virtualization Infrastructure. Journal of Service Science, 2, 17-22.

[6]   Payne, B.D. (2010) Improving Host-Based Computer Security Using Secure Active Monitoring and Memory Analysis. Georgia Institute of Technology, Atlanta.

[7]   Peng, Q. and Yu, C. (2007) Enhanced Integrated Manufacturing Systems in an Immersive Virtual Environment. Proceedings of the Institution of Mechanical Engineers, 221, 477-487.

[8]   Perkins, G.H. (2004) Will Libraries’ Web-Based Survey Methods Replace Existing Nonelectronic Survey Methods. Information Technology and Libraries, 23, 123-126.

[9]   Petter, S., Delone, W. and McLean, E. (2008) Measuring Information Systems Success: Models, Dimensions, Measures, and Interrelationships. European Journal of Information Systems, 17, 236-263.

[10]   Pozgaj, Z. and Strahonja, J. (2008) It Service Management Based on Itil Methodology. 965-978.

[11]   Prism MicroSystems (2010) 2010 State of Virtualization Security Survey.

[12]   Reichman, A. (2009) Rethinking Storage for Server Virtualization Environments. TechTarget.

[13]   Rosnow, R.L. and Rosenthal, R. (2008) Beginning Behavioral Research: A Conceptual Primer. 6th Edition, Pearson Prentice Hall, Upper Saddle River.

[14]   RSA List Service (2012) Fortune 1000 Company List.

[15]   Samoilenko, S. (2008) Information Systems Fitness and Risk in IS Development: Insights and Implications from Chaos and Complex Systems Theories. Information Systems Frontiers, 10, 281-292.

[16]   Sandifer, C. (2008) The Economics of Virtualization. University of South Carolina, Columbia.

[17]   Scadden, R., Bogdany, R., Clifford, J., Pearthree, H. and Locke, R. (2008) Resilient Hosting in a Continuously Available Virtualized Environment. IBM Systems Journal, 47, 535-548.

[18]   Seiler, S. and Pfister, A.C. (2009) Why Did I Do This: Understanding Leadership Behavior through a Dynamic Five-Factor Model of Leadership? Journal of Leadership Studies, 3, 41-52.