Share This Article:

Virtualization Security, Strategy and Management

Abstract Full-Text HTML XML Download Download as PDF (Size:2557KB) PP. 423-429
DOI: 10.4236/ijcns.2014.710043    4,491 Downloads   5,100 Views   Citations

ABSTRACT

The purpose of this quantitative study was to determine the relationship between the security management framework of organizations and the security condition of the virtualized environment.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Tran, S. and Gold, S. (2014) Virtualization Security, Strategy and Management. International Journal of Communications, Network and System Sciences, 7, 423-429. doi: 10.4236/ijcns.2014.710043.

References

[1] Neiger, G., Santoni, A., Leung, F. and Rodgers, D. (2006) Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization. Intel Technology Journal, 10, 167.
http://dx.doi.org/10.1535/itj
[2] Neuman, L.W. (2006) Social Research Methods: Qualitative and Quantitative Approaches. 6th Editon, Allyn and Bacon, Boston.
[3] Nikhil, B. (2009) Performance Evaluation of Intel EPT Hardware Assist. VMware, Inc., California. http://www.vmware.com
[4] Nikitasha, P., Jyotiprakash, S., Subasish, M. and Prasanna, P.S. (2011) A Security Framework for Virtualization Based Computing Environment. International Journal of Engineering Science and Technology, 3, 6423-6429. http://www.techrepublic.com/research-library
[5] Park, Y.R. and Sharma, S. (2009) Providing Service Using a Virtualization Infrastructure. Journal of Service Science, 2, 17-22. http://search.proquest.com/docview/195627357?accountid=35812
[6] Payne, B.D. (2010) Improving Host-Based Computer Security Using Secure Active Monitoring and Memory Analysis. Georgia Institute of Technology, Atlanta. http://www.bryanpayne.org/
[7] Peng, Q. and Yu, C. (2007) Enhanced Integrated Manufacturing Systems in an Immersive Virtual Environment. Proceedings of the Institution of Mechanical Engineers, 221, 477-487.
http://search.proquest.com/docview/195146511?accountid=35812
http://dx.doi.org/10.1243/09544054JEM453
[8] Perkins, G.H. (2004) Will Libraries’ Web-Based Survey Methods Replace Existing Nonelectronic Survey Methods. Information Technology and Libraries, 23, 123-126.
[9] Petter, S., Delone, W. and McLean, E. (2008) Measuring Information Systems Success: Models, Dimensions, Measures, and Interrelationships. European Journal of Information Systems, 17, 236-263. http://www.palgrave-journals.com http://dx.doi.org/10.1057/ejis.2008.15
[10] Pozgaj, Z. and Strahonja, J. (2008) It Service Management Based on Itil Methodology. 965-978. http://search.proquest.com/docview/217738441?accountid=35812
[11] Prism MicroSystems (2010) 2010 State of Virtualization Security Survey.
http://www.prismmicrosys.com/documents/VirtualizationSecuritySurvey2010.pdf
[12] Reichman, A. (2009) Rethinking Storage for Server Virtualization Environments. TechTarget.
http://searchservervirtualization.techtarget.com
[13] Rosnow, R.L. and Rosenthal, R. (2008) Beginning Behavioral Research: A Conceptual Primer. 6th Edition, Pearson Prentice Hall, Upper Saddle River.
[14] RSA List Service (2012) Fortune 1000 Company List. http://www.rsalistsinc.com
[15] Samoilenko, S. (2008) Information Systems Fitness and Risk in IS Development: Insights and Implications from Chaos and Complex Systems Theories. Information Systems Frontiers, 10, 281-292. http://dx.doi.org/10.1007/s10796-008-9078-3
[16] Sandifer, C. (2008) The Economics of Virtualization. University of South Carolina, Columbia. http://search.proquest.com
[17] Scadden, R., Bogdany, R., Clifford, J., Pearthree, H. and Locke, R. (2008) Resilient Hosting in a Continuously Available Virtualized Environment. IBM Systems Journal, 47, 535-548.
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5386523
http://dx.doi.org/10.1147/SJ.2008.5386523
[18] Seiler, S. and Pfister, A.C. (2009) Why Did I Do This: Understanding Leadership Behavior through a Dynamic Five-Factor Model of Leadership? Journal of Leadership Studies, 3, 41-52.
http://dx.doi.org/10.1002/jls.20122

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.