Table 2 - uploaded by Madini O. Alassafi
Content may be subject to copyright.
(continued) 

(continued) 

Source publication
Chapter
Full-text available
Any organisation using the internet to conduct business is vulnerable to violation of security. Currently security in most organizations relates to protection of data and the management of their business information systems. Hence, security is often de?ned as the protection of information, the system, and hardware; that use, store and relocates tha...

Similar publications

Article
Full-text available
While cloud customers can benefit from migrating applications to the cloud, they are concerned about the security of the hosted applications. This is complicated by the customers not knowing whether their cloud applications are working as expected. Although memory-safety Java Virtual Machine (JVM) can alleviate their anxiety due to the control flow...