Skip to main content
Ontario Tech acknowledges the lands and people of the Mississaugas of Scugog Island First Nation.

We are thankful to be welcome on these lands in friendship. The lands we are situated on are covered by the Williams Treaties and are the traditional territory of the Mississaugas, a branch of the greater Anishinaabeg Nation, including Algonquin, Ojibway, Odawa and Pottawatomi. These lands remain home to many Indigenous nations and peoples.

We acknowledge this land out of respect for the Indigenous nations who have cared for Turtle Island, also called North America, from before the arrival of settler peoples until this day. Most importantly, we acknowledge that the history of these lands has been tainted by poor treatment and a lack of friendship with the First Nations who call them home.

This history is something we are all affected by because we are all treaty people in Canada. We all have a shared history to reflect on, and each of us is affected by this history in different ways. Our past defines our present, but if we move forward as friends and allies, then it does not have to define our future.

Learn more about Indigenous Education and Cultural Services

February 17, 2010

Speaker: Dr. Khalil A. Abuosba, Researcher, Ontario Tech University (Ontario Tech).

Title: Operational Trust Management: Defusing Intrusion Capabilities by Collaborative Anomalous Trust Management 

Abstract: From a computer security prospective, services provided by distributed information systems may be organized based on their security attributes goals and requirements; these processes and services are categorized as anonymous, registered, encrypted and trusted. In this research, we propose a solution for operational trust assurance problems where vulnerabilities reduction is implicitly observed. Collaborative Anomalous Trust Management (CATM) is a methodology that may be utilized for the purpose of affirming trust between communications endpoints. In conjunction with Trusted Computing Base, Zero Knowledge Protocol, and Layered Trust, CATM is defined. CATM builds its trust credentials based on computing environment variables. Ideally this methodology is suited for Service Oriented Architectures such as web services where service providers and consumers interact at different levels of security requirements. This methodology is best optimized for use as a risk management utility. In this approach vulnerabilities are implicitly reduced, hence intrusion capabilities are defused. This seminar is geared towards sharing ideas and future directions of the research. 

Biography: Khalil A. Abuosba, formerly assistant professor at Philadelphia University (Jordan), is a teaching assistant and a researcher at Ontario Tech University (Ontario Tech). His research interests include distributed systems architectures, operating systems security, operational trust management, and e-management. His credentials are a PhD in Computer Information Systems (Faculty of Information Systems and Technology at the Arab Academy for Banking and Financial Sciences, Jordan), a MSc in Computer Science (Jackson State University, USA), a BSc in Industrial Engineering (Electronics Engineering Technology, Jackson State University, USA). Dr. Abuosba has published several research papers in major IEEE conferences and technical magazines.