An efficient trust negotiation strategy towards the resource-limited mobile commerce environment

Bailing LIU, Yanhui LI, Bing ZENG, Chao LEI

PDF(763 KB)
PDF(763 KB)
Front. Comput. Sci. ›› 2016, Vol. 10 ›› Issue (3) : 543-558. DOI: 10.1007/s11704-015-4559-2
RESEARCH ARTICLE

An efficient trust negotiation strategy towards the resource-limited mobile commerce environment

Author information +
History +

Abstract

Automated trust negotiation (ATN) offers an attractive means for trust establishments, which establishes mutual trust among strangers wishing to share resources or conduct business, but it comes at the cost of non-trivial computation and communication overheads. The deployment of ATN strategies on a resource-constrained mobile device may lead to user-obstructive latency for operations. In this paper, we propose a trust negotiation strategy called trust target Petri nets negotiation strategy (TPNNS). It highly reduces the negotiation latency in the mobile device compared with other negotiation strategies, since it considers all the alternative responses at each step and chooses the best one. TPNNS supports cycle avoidance and employs skipped TPN which is a new approach presented in this paper. What is more, it is complete and ensures no irrelevant credentials are disclosed during the trust negotiation.

Keywords

automated trust negotiation / mobile commerce / negotiation strategy / Petri net

Cite this article

Download citation ▾
Bailing LIU, Yanhui LI, Bing ZENG, Chao LEI. An efficient trust negotiation strategy towards the resource-limited mobile commerce environment. Front. Comput. Sci., 2016, 10(3): 543‒558 https://doi.org/10.1007/s11704-015-4559-2

References

[1]
Chong A Y L, Chan F T S, Ooi K B. Predicting consumer decisions to adopt mobile commerce: cross country empirical examination between china and malaysia. Decision Support Systems, 2012, 53(1): 34–43
[2]
Hoffman D L, Novak T P, Peralta M. Building consumer trust online. Communications of the ACM, 1999, 42(4): 80–85
[3]
Hu R B, Yang D L, Qi R H. Recommended trust evaluation model in mobile commerce based on combination evaluation mode. Operations Research and Management Science, 2010
[4]
Turban E, King D, King D, Lee J K, Marshall P, Lee J, McKay J. Electronic Commerce 2008: A Managerial Perspective. Englewood Cliffs, NJ: Prentice Hall, 2007
[5]
Siau K, Shen Z. Building customer trust in mobile commerce. Communications of the ACM, 2003, 46(4): 91–94
[6]
Luo X, Li H, Zhang J, Shim J P. Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking services. Decision Support Systems, 2010, 49(2): 222–234
[7]
Siau K, Sheng H, Nah F, Davis S. A qualitative investigation on consumer trust in mobile commerce. International Journal of Electronic Business, 2004, 2(3): 283–300
[8]
Winsborough W H, Seamons K E, Jones V E. Automated trust negotiation. In: Proceedings of DARPA Information Survivability Conference and Exposition. 2000, 88–102
[9]
Winsborough W H, Li N. Towards practical automated trust negotiation. In: Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks. 2002, 92–103
[10]
Kim H W, Chan H C,Gupta S. Value-based adoption of mobile internet: an empirical investigation. Decision Support Systems, 2007, 43(1): 111–126
[11]
Magura B. What hooks m-commerce customers? MIT Sloan Management Review, 2003, 44(3): 9
[12]
Mahatanankoon P, Wen H J, Lim B. Consumer-based m-commerce: exploring consumer perception of mobile applications. Computer Standards and Interfaces, 2005, 27(4): 347–357
[13]
Winslett M, Lee A J, Perano K J. Trust negotiation: authorization for virtual organizations. In: Proceedings of the 5th ACM Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies. 2009, 43
[14]
Yu T, Ma X, Winslett M. Prunes: an efficient and complete strategy for automated trust negotiation over the Internet. In: Proceedings of the 7th ACM Conference on Computer and Communications Security. 2000, 210–219
[15]
He Y, Zhu M. A complete and efficient strategy based on Petri net in automated trust negotiation. In: Proceedings of the 2nd International Conference on Scalable Information Systems. 2007, 75
[16]
Yu T, Winslett M, Seamons K E. Interoperable strategies in automated trust negotiation. In: Proceedings of the 8th ACM Conference on Computer and Communications Security. 2001, 146–155
[17]
Liu X, Tang S, Huang Q, Yu Z W. An ontology-based approach to automated trust negotiation. Computer Standards and Interfaces, 2013, 36(1): 219–230
[18]
Lu H, Liu B. DFANS: a highly efficient strategy for automated trust negotiation. Computers and Security, 2009, 28(7): 557–565
[19]
Li N, Du W, Boneh D. Oblivious signature-based envelope. Distributed Computing, 2005, 17(4): 293–302

RIGHTS & PERMISSIONS

2014 Higher Education Press and Springer-Verlag Berlin Heidelberg
AI Summary AI Mindmap
PDF(763 KB)

Accesses

Citations

Detail

Sections
Recommended

/