{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T07:24:00Z","timestamp":1769239440754,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":3,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,4,13]],"date-time":"2009-04-13T00:00:00Z","timestamp":1239580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,4,13]]},"DOI":"10.1145\/1558607.1558655","type":"proceedings-article","created":{"date-parts":[[2009,6,30]],"date-time":"2009-06-30T13:10:54Z","timestamp":1246367454000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Virtualization security"],"prefix":"10.1145","author":[{"given":"Edward","family":"Ray","sequence":"first","affiliation":[{"name":"NetSec Design &amp; Consulting, Inc., Orange, CA"}]},{"given":"Eugene","family":"Schultz","sequence":"additional","affiliation":[{"name":"Emagined Security, San Carlos, CA"}]}],"member":"320","published-online":{"date-parts":[[2009,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Planning and Securing Virtualization Servers,\" Prentice Hall","author":"Haletky Edward L","year":"2008","unstructured":"Haletky , Edward L . \"V Mware ESX Server in the Enterprise : Planning and Securing Virtualization Servers,\" Prentice Hall , 2008 Haletky, Edward L. \"VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers,\" Prentice Hall, 2008"},{"key":"e_1_3_2_1_2_1","volume-title":"An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments","author":"Ormandy Travis","year":"2008","unstructured":"Ormandy , Travis . An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments . September 2, 2008 , http:\/\/taviso.decsystem.org\/virtsec.pdf Ormandy, Travis. An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments. September 2, 2008, http:\/\/taviso.decsystem.org\/virtsec.pdf"},{"key":"e_1_3_2_1_3_1","volume-title":"March 15","author":"Waters John K","year":"2008","unstructured":"Waters , John K . \" ABC : An Introduction to Virtualization,\" CIO , March 15 , 2008 , http:\/\/www.cio.com\/article\/40701\/ABC_An_Introduction_to_Virtualization Waters, John K. \"ABC: An Introduction to Virtualization,\" CIO, March 15, 2008, http:\/\/www.cio.com\/article\/40701\/ABC_An_Introduction_to_Virtualization"}],"event":{"name":"CSIIRW '09: Fifth Cyber Security and Information Intelligence Research Workshop","location":"Oak Ridge Tennessee USA","acronym":"CSIIRW '09"},"container-title":["Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1558607.1558655","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1558607.1558655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:57Z","timestamp":1750253397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1558607.1558655"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4,13]]},"references-count":3,"alternative-id":["10.1145\/1558607.1558655","10.1145\/1558607"],"URL":"https:\/\/doi.org\/10.1145\/1558607.1558655","relation":{},"subject":[],"published":{"date-parts":[[2009,4,13]]},"assertion":[{"value":"2009-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}