Abstract
Automated trust negotiation (ATN) offers an attractivemeans for trust establishments, which establishesmutual trust among strangers wishing to share resources or conduct business, but it comes at the cost of non-trivial computation and communication overheads. The deployment of ATN strategies on a resource-constrained mobile device may lead to user-obstructive latency for operations. In this paper, we propose a trust negotiation strategy called trust target Petri nets negotiation strategy (TPNNS). It highly reduces the negotiation latency in the mobile device compared with other negotiation strategies, since it considers all the alternative responses at each step and chooses the best one. TPNNS supports cycle avoidance and employs skipped TPN which is a new approach presented in this paper. What is more, it is complete and ensures no irrelevant credentials are disclosed during the trust negotiation.
Similar content being viewed by others
References
Chong A Y L, Chan F T S, Ooi K B. Predicting consumer decisions to adopt mobile commerce: cross country empirical examination between china and malaysia. Decision Support Systems, 2012, 53(1): 34–43
Hoffman D L, Novak T P, Peralta M. Building consumer trust online. Communications of the ACM, 1999, 42(4): 80–85
Hu R B, Yang D L, Qi R H. Recommended trust evaluation model in mobile commerce based on combination evaluation mode. Operations Research and Management Science, 2010
Turban E, King D, King D, Lee J K, Marshall P, Lee J, McKay J. Electronic Commerce 2008: A Managerial Perspective. Englewood Cliffs, NJ: Prentice Hall, 2007
Siau K, Shen Z. Building customer trust in mobile commerce. Communications of the ACM, 2003, 46(4): 91–94
Luo X, Li H, Zhang J, Shim J P. Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking services. Decision Support Systems, 2010, 49(2): 222–234
Siau K, Sheng H, Nah F, Davis S. A qualitative investigation on consumer trust in mobile commerce. International Journal of Electronic Business, 2004, 2(3): 283–300
Winsborough WH, Seamons K E, Jones V E. Automated trust negotiation. In: Proceedings of DARPA Information Survivability Conference and Exposition. 2000, 88–102
Winsborough W H, Li N. Towards practical automated trust negotiation. In: Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks. 2002, 92–103
Kim H W, Chan H C, Gupta S. Value-based adoption of mobile internet: an empirical investigation. Decision Support Systems, 2007, 43(1): 111–126
Magura B. What hooks m-commerce customers? MIT Sloan Management Review, 2003, 44(3): 9
Mahatanankoon P, Wen H J, Lim B. Consumer-based m-commerce: exploring consumer perception of mobile applications. Computer Standards and Interfaces, 2005, 27(4): 347–357
Winslett M, Lee A J, Perano K J. Trust negotiation: authorization for virtual organizations. In: Proceedings of the 5th ACM Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies. 2009, 43
Yu T, Ma X, Winslett M. Prunes: an efficient and complete strategy for automated trust negotiation over the Internet. In: Proceedings of the 7th ACM Conference on Computer and Communications Security. 2000, 210–219
He Y, Zhu M. A complete and efficient strategy based on Petri net in automated trust negotiation. In: Proceedings of the 2nd International Conference on Scalable Information Systems. 2007, 75
Yu T, Winslett M, Seamons K E. Interoperable strategies in automated trust negotiation. In: Proceedings of the 8th ACM Conference on Computer and Communications Security. 2001, 146–155
Liu X, Tang S, Huang Q, Yu Z W. An ontology-based approach to automated trust negotiation. Computer Standards and Interfaces, 2013, 36(1): 219–230
Lu H, Liu B. DFANS: a highly efficient strategy for automated trust negotiation. Computers and Security, 2009, 28(7): 557–565
Li N, DuW, Boneh D. Oblivious signature-based envelope. Distributed Computing, 2005, 17(4): 293–302
Author information
Authors and Affiliations
Corresponding author
Additional information
Bailing Liu is an associate professor in the School of Information and Management, Central China Normal University, China. She received the PhD degree in computer science from Huazhong University of Science and Technology, China. Her research interests include information security and privacy.
Yanhui Li is a professor and the vice dean of School of Information Management at Central China Normal University, China. He received the PhD degree in management science and engineering at Huazhong University of Science and Technology, China. His research interests are in the areas of logistics system engineering and supply chain management.
Bing Zeng received the BE degree in economics from Huazhong Agricultural University, China in 2004, and received the BE degree in computer science and technology, the ME degree and the PhD degree in information security from Huazhong University of Science and Technology, China in 2004, 2007 and 2012, respectively. He is currently an assistant professor at South China University of Technology, China. His research interests are cryptography and network security.
Chao Lei is a graduate of Central China Normal University, China. His major is management science and engineering.
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Liu, B., Li, Y., Zeng, B. et al. An efficient trust negotiation strategy towards the resource-limited mobile commerce environment. Front. Comput. Sci. 10, 543–558 (2016). https://doi.org/10.1007/s11704-015-4559-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11704-015-4559-2