Virtualization Security, Strategy and Management


The purpose of this quantitative study was to determine the relationship between the security management framework of organizations and the security condition of the virtualized environment.

Share and Cite:

Tran, S. and Gold, S. (2014) Virtualization Security, Strategy and Management. International Journal of Communications, Network and System Sciences, 7, 423-429. doi: 10.4236/ijcns.2014.710043.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Neiger, G., Santoni, A., Leung, F. and Rodgers, D. (2006) Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization. Intel Technology Journal, 10, 167.
[2] Neuman, L.W. (2006) Social Research Methods: Qualitative and Quantitative Approaches. 6th Editon, Allyn and Bacon, Boston.
[3] Nikhil, B. (2009) Performance Evaluation of Intel EPT Hardware Assist. VMware, Inc., California.
[4] Nikitasha, P., Jyotiprakash, S., Subasish, M. and Prasanna, P.S. (2011) A Security Framework for Virtualization Based Computing Environment. International Journal of Engineering Science and Technology, 3, 6423-6429.
[5] Park, Y.R. and Sharma, S. (2009) Providing Service Using a Virtualization Infrastructure. Journal of Service Science, 2, 17-22.
[6] Payne, B.D. (2010) Improving Host-Based Computer Security Using Secure Active Monitoring and Memory Analysis. Georgia Institute of Technology, Atlanta.
[7] Peng, Q. and Yu, C. (2007) Enhanced Integrated Manufacturing Systems in an Immersive Virtual Environment. Proceedings of the Institution of Mechanical Engineers, 221, 477-487.
[8] Perkins, G.H. (2004) Will Libraries’ Web-Based Survey Methods Replace Existing Nonelectronic Survey Methods. Information Technology and Libraries, 23, 123-126.
[9] Petter, S., Delone, W. and McLean, E. (2008) Measuring Information Systems Success: Models, Dimensions, Measures, and Interrelationships. European Journal of Information Systems, 17, 236-263.
[10] Pozgaj, Z. and Strahonja, J. (2008) It Service Management Based on Itil Methodology. 965-978.
[11] Prism MicroSystems (2010) 2010 State of Virtualization Security Survey.
[12] Reichman, A. (2009) Rethinking Storage for Server Virtualization Environments. TechTarget.
[13] Rosnow, R.L. and Rosenthal, R. (2008) Beginning Behavioral Research: A Conceptual Primer. 6th Edition, Pearson Prentice Hall, Upper Saddle River.
[14] RSA List Service (2012) Fortune 1000 Company List.
[15] Samoilenko, S. (2008) Information Systems Fitness and Risk in IS Development: Insights and Implications from Chaos and Complex Systems Theories. Information Systems Frontiers, 10, 281-292.
[16] Sandifer, C. (2008) The Economics of Virtualization. University of South Carolina, Columbia.
[17] Scadden, R., Bogdany, R., Clifford, J., Pearthree, H. and Locke, R. (2008) Resilient Hosting in a Continuously Available Virtualized Environment. IBM Systems Journal, 47, 535-548.
[18] Seiler, S. and Pfister, A.C. (2009) Why Did I Do This: Understanding Leadership Behavior through a Dynamic Five-Factor Model of Leadership? Journal of Leadership Studies, 3, 41-52.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.