Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zailani Mohamed Sidek is active.

Publication


Featured researches published by Zailani Mohamed Sidek.


international symposium on information technology | 2008

System architecture for SQL injection and insider misuse detection system for DBMS

Aziah Asmawi; Zailani Mohamed Sidek; Shukor Abd Razak

As organizations increase their adoption of database systems as one of their key data management technologies for the daily operations and decision makings, the security of data managed by these systems becomes crucial. Damage and misuse of data affect not only a single user or application, but may have effect the entire organization. The recent rapid proliferations of web-based applications with database at its backend have further increased the risk of database exposure to the outside world. There are many recent reports on intrusion from external hackers which compromised the database system. However, there are also insiders who abuse their privileges and access the database system for many intentions. For that reason, it is imperative for us to secure database system from both external and internal attacks. This paper describes on database security threats and the existing works that had been done to mitigate these problems. One of possible solutions is by using Intrusion Detection System (IDS). For that reason, this study proposed a novel SQL Injections and Insider Misuse Detection System (SIIMDS) to provide higher level of security for database system.


advanced information networking and applications | 2010

Towards a Unified Trust Model in Pervasive Systems

Hamed Khiabani; Zailani Mohamed Sidek; Jamalul Lail Ab Manan

The pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by even unknown parties. So run time trustworthiness calculation would be a major issue in these environments. The huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors like context, recommendation, and history to precisely calculate trustworthiness of each party. In this paper we review previous trust models in pervasive systems and analyze them to highlight the importance of our research, and then we introduce a Unified Trust Model (UTM) which calculates entities trustworthiness based on history, recommendation, and context and formally use these factors in trustworthiness calculation. Finally we describe our future research plan to add platform properties using Trusted Platform Modules (TPM) in calculating trustworthiness.


International Conference for Technical Postgraduates 2009, TECHPOS 2009 | 2009

A study of trust & privacy models in pervasive computing approach to trusted computing platforms

Hamed Khiabani; Jamalul Lail Ab Manan; Zailani Mohamed Sidek

The pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by even unknown parties. So trust and privacy would be a major issue in these environments. The huge number of interactions between users and pervasive devices necessitate a comprehensive trust and privacy models which unifies different technologies to precisely calculate trustworthiness of each party and maintain privacy. In this paper we review previous trust and privacy models in pervasive systems and analyze them to highlight the importance of trusted computing platforms in tackling their weaknesses.


international symposium on information technology | 2008

Privacy-preserving in web services using hippocratic database

Norjihan Abdul Ghani; Zailani Mohamed Sidek

Nowadays, the growth of internet has been accompanied by the growth of web services (e.g e-government, e-health, e-commerce). Web services collect data, especially individuals, from users and use them for various purposes. Sometimes, web services need to release the data they own to third parties. Because privacy is an important concern in web services, there are several research efforts have been devoted to address issues related to the development of privacy-preserving data management techniques. In [3], Agrawal et. al. has introduced Hippocratic Database incorporating privacy protection in relational database systems. In this paper, we’ll proposed the use of Hippocratic Database to ensure the privacy in web services. We use a scenario for driving license renewal by Road Transport Department in order to illustrate this.


international symposium on information technology | 2010

SIDIF: Location based technique as a determinant of effectiveness and efficiency in artificial reefs development project

W. Aezwani W. Abu Bakar; Zailani Mohamed Sidek; Mustafa Man; Mohammad Zaidi Zakaria

Evaluation for effectiveness and efficiency of artificial reefs (AR) development is quite difficult and troublesome. This is because of high cost incurred. As for common practice, evaluation process is done by special dive task force unit to conduct diving activity to observe on how AR has developed. The paper presents framework architecture to integrate location coordinate data (longitude and latitude) of AR with the fish catches data at all identified jetty. In SIDIF, the data of fish catches will be mapped with data on location coordinate of AR as a whole via mapping and integration of these two (2) different databases. Using this methodology, the effectiveness and efficiency of AR development will be achieved as well as the evaluation will be measured.


Technical Postgraduates (TECHPOS), 2009 International Conference for | 2010

A study of trust & privacy models in pervasive computing

Hamed Khiabani; Jamalul Lail Ab Manan; Zailani Mohamed Sidek

The pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by even unknown parties. So trust and privacy would be a major issue in these environments. The huge number of interactions between users and pervasive devices necessitate a comprehensive trust and privacy models which unifies different technologies to precisely calculate trustworthiness of each party and maintain privacy. In this paper we review previous trust and privacy models in pervasive systems and analyze them to highlight the importance of trusted computing platforms in tackling their weaknesses.


OCEANS'10 IEEE SYDNEY | 2010

SIDIF: Location based technique for spatial information databases integration framework

Mustafa Man; Zailani Mohamed Sidek; Yazid Mohd Saman; Muhammad Zaidi Zakaria

Evaluation for effectiveness and efficiency of artificial reefs (AR) development is quite difficult and troublesome. This is because of high cost incurred. As for common practice, evaluation process is done by special dive task force unit to conduct diving activity to observe on how AR has developed. This paper presents a framework architecture to integrate location coordinate data (longitude and lattitude) of AR with the fish catches data at all identified jetty. In SIDIF, the data of fish catches will be mapped with data on location coordinate of AR as a whole via mapping and integration of these two (2) different databases. Using this methodology, the effectiveness and efficiency of AR development will be achieved as well as the evaluation will be measured. In this study, research only made integration two database only namely artificial reef database (ARPOS) and fish landing database (WiFISH). Before integration process both this database is conducted, various issues should be identified over proceed.


international conference on information security | 2008

Controlling your personal information disclosure

Norjihan Abdul Ghani; Zailani Mohamed Sidek


WSEAS Transactions on Information Science and Applications archive | 2009

Personal information privacy protection in e-commerce

Norjihan Abdul Ghani; Zailani Mohamed Sidek


international conference on information security | 2008

Personal information and privacy in E-commerce application

Norjihan Abdul Ghani; Zailani Mohamed Sidek

Collaboration


Dive into the Zailani Mohamed Sidek's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hamed Khiabani

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Harihodin Selamat

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Aziah Asmawi

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mustafa Man

Universiti Malaysia Terengganu

View shared research outputs
Top Co-Authors

Avatar

Mohammad Zaidi Zakaria

Universiti Malaysia Terengganu

View shared research outputs
Top Co-Authors

Avatar

Muhammad Zaidi Zakaria

Universiti Malaysia Terengganu

View shared research outputs
Top Co-Authors

Avatar

Norbik Bashah Idris

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Saiful Adli Ismail

Universiti Teknologi Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge