Zailani Mohamed Sidek
Universiti Teknologi Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Zailani Mohamed Sidek.
international symposium on information technology | 2008
Aziah Asmawi; Zailani Mohamed Sidek; Shukor Abd Razak
As organizations increase their adoption of database systems as one of their key data management technologies for the daily operations and decision makings, the security of data managed by these systems becomes crucial. Damage and misuse of data affect not only a single user or application, but may have effect the entire organization. The recent rapid proliferations of web-based applications with database at its backend have further increased the risk of database exposure to the outside world. There are many recent reports on intrusion from external hackers which compromised the database system. However, there are also insiders who abuse their privileges and access the database system for many intentions. For that reason, it is imperative for us to secure database system from both external and internal attacks. This paper describes on database security threats and the existing works that had been done to mitigate these problems. One of possible solutions is by using Intrusion Detection System (IDS). For that reason, this study proposed a novel SQL Injections and Insider Misuse Detection System (SIIMDS) to provide higher level of security for database system.
advanced information networking and applications | 2010
Hamed Khiabani; Zailani Mohamed Sidek; Jamalul Lail Ab Manan
The pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by even unknown parties. So run time trustworthiness calculation would be a major issue in these environments. The huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors like context, recommendation, and history to precisely calculate trustworthiness of each party. In this paper we review previous trust models in pervasive systems and analyze them to highlight the importance of our research, and then we introduce a Unified Trust Model (UTM) which calculates entities trustworthiness based on history, recommendation, and context and formally use these factors in trustworthiness calculation. Finally we describe our future research plan to add platform properties using Trusted Platform Modules (TPM) in calculating trustworthiness.
International Conference for Technical Postgraduates 2009, TECHPOS 2009 | 2009
Hamed Khiabani; Jamalul Lail Ab Manan; Zailani Mohamed Sidek
The pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by even unknown parties. So trust and privacy would be a major issue in these environments. The huge number of interactions between users and pervasive devices necessitate a comprehensive trust and privacy models which unifies different technologies to precisely calculate trustworthiness of each party and maintain privacy. In this paper we review previous trust and privacy models in pervasive systems and analyze them to highlight the importance of trusted computing platforms in tackling their weaknesses.
international symposium on information technology | 2008
Norjihan Abdul Ghani; Zailani Mohamed Sidek
Nowadays, the growth of internet has been accompanied by the growth of web services (e.g e-government, e-health, e-commerce). Web services collect data, especially individuals, from users and use them for various purposes. Sometimes, web services need to release the data they own to third parties. Because privacy is an important concern in web services, there are several research efforts have been devoted to address issues related to the development of privacy-preserving data management techniques. In [3], Agrawal et. al. has introduced Hippocratic Database incorporating privacy protection in relational database systems. In this paper, we’ll proposed the use of Hippocratic Database to ensure the privacy in web services. We use a scenario for driving license renewal by Road Transport Department in order to illustrate this.
international symposium on information technology | 2010
W. Aezwani W. Abu Bakar; Zailani Mohamed Sidek; Mustafa Man; Mohammad Zaidi Zakaria
Evaluation for effectiveness and efficiency of artificial reefs (AR) development is quite difficult and troublesome. This is because of high cost incurred. As for common practice, evaluation process is done by special dive task force unit to conduct diving activity to observe on how AR has developed. The paper presents framework architecture to integrate location coordinate data (longitude and latitude) of AR with the fish catches data at all identified jetty. In SIDIF, the data of fish catches will be mapped with data on location coordinate of AR as a whole via mapping and integration of these two (2) different databases. Using this methodology, the effectiveness and efficiency of AR development will be achieved as well as the evaluation will be measured.
Technical Postgraduates (TECHPOS), 2009 International Conference for | 2010
Hamed Khiabani; Jamalul Lail Ab Manan; Zailani Mohamed Sidek
The pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by even unknown parties. So trust and privacy would be a major issue in these environments. The huge number of interactions between users and pervasive devices necessitate a comprehensive trust and privacy models which unifies different technologies to precisely calculate trustworthiness of each party and maintain privacy. In this paper we review previous trust and privacy models in pervasive systems and analyze them to highlight the importance of trusted computing platforms in tackling their weaknesses.
OCEANS'10 IEEE SYDNEY | 2010
Mustafa Man; Zailani Mohamed Sidek; Yazid Mohd Saman; Muhammad Zaidi Zakaria
Evaluation for effectiveness and efficiency of artificial reefs (AR) development is quite difficult and troublesome. This is because of high cost incurred. As for common practice, evaluation process is done by special dive task force unit to conduct diving activity to observe on how AR has developed. This paper presents a framework architecture to integrate location coordinate data (longitude and lattitude) of AR with the fish catches data at all identified jetty. In SIDIF, the data of fish catches will be mapped with data on location coordinate of AR as a whole via mapping and integration of these two (2) different databases. Using this methodology, the effectiveness and efficiency of AR development will be achieved as well as the evaluation will be measured. In this study, research only made integration two database only namely artificial reef database (ARPOS) and fish landing database (WiFISH). Before integration process both this database is conducted, various issues should be identified over proceed.
international conference on information security | 2008
Norjihan Abdul Ghani; Zailani Mohamed Sidek
WSEAS Transactions on Information Science and Applications archive | 2009
Norjihan Abdul Ghani; Zailani Mohamed Sidek
international conference on information security | 2008
Norjihan Abdul Ghani; Zailani Mohamed Sidek