Skip to main content
Log in

An efficient trust negotiation strategy towards the resource-limited mobile commerce environment

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

Automated trust negotiation (ATN) offers an attractivemeans for trust establishments, which establishesmutual trust among strangers wishing to share resources or conduct business, but it comes at the cost of non-trivial computation and communication overheads. The deployment of ATN strategies on a resource-constrained mobile device may lead to user-obstructive latency for operations. In this paper, we propose a trust negotiation strategy called trust target Petri nets negotiation strategy (TPNNS). It highly reduces the negotiation latency in the mobile device compared with other negotiation strategies, since it considers all the alternative responses at each step and chooses the best one. TPNNS supports cycle avoidance and employs skipped TPN which is a new approach presented in this paper. What is more, it is complete and ensures no irrelevant credentials are disclosed during the trust negotiation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Chong A Y L, Chan F T S, Ooi K B. Predicting consumer decisions to adopt mobile commerce: cross country empirical examination between china and malaysia. Decision Support Systems, 2012, 53(1): 34–43

    Article  Google Scholar 

  2. Hoffman D L, Novak T P, Peralta M. Building consumer trust online. Communications of the ACM, 1999, 42(4): 80–85

    Article  Google Scholar 

  3. Hu R B, Yang D L, Qi R H. Recommended trust evaluation model in mobile commerce based on combination evaluation mode. Operations Research and Management Science, 2010

    Google Scholar 

  4. Turban E, King D, King D, Lee J K, Marshall P, Lee J, McKay J. Electronic Commerce 2008: A Managerial Perspective. Englewood Cliffs, NJ: Prentice Hall, 2007

    Google Scholar 

  5. Siau K, Shen Z. Building customer trust in mobile commerce. Communications of the ACM, 2003, 46(4): 91–94

    Article  Google Scholar 

  6. Luo X, Li H, Zhang J, Shim J P. Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking services. Decision Support Systems, 2010, 49(2): 222–234

    Article  Google Scholar 

  7. Siau K, Sheng H, Nah F, Davis S. A qualitative investigation on consumer trust in mobile commerce. International Journal of Electronic Business, 2004, 2(3): 283–300

    Article  Google Scholar 

  8. Winsborough WH, Seamons K E, Jones V E. Automated trust negotiation. In: Proceedings of DARPA Information Survivability Conference and Exposition. 2000, 88–102

    Google Scholar 

  9. Winsborough W H, Li N. Towards practical automated trust negotiation. In: Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks. 2002, 92–103

    Chapter  Google Scholar 

  10. Kim H W, Chan H C, Gupta S. Value-based adoption of mobile internet: an empirical investigation. Decision Support Systems, 2007, 43(1): 111–126

    Article  Google Scholar 

  11. Magura B. What hooks m-commerce customers? MIT Sloan Management Review, 2003, 44(3): 9

    Google Scholar 

  12. Mahatanankoon P, Wen H J, Lim B. Consumer-based m-commerce: exploring consumer perception of mobile applications. Computer Standards and Interfaces, 2005, 27(4): 347–357

    Article  Google Scholar 

  13. Winslett M, Lee A J, Perano K J. Trust negotiation: authorization for virtual organizations. In: Proceedings of the 5th ACM Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies. 2009, 43

    Google Scholar 

  14. Yu T, Ma X, Winslett M. Prunes: an efficient and complete strategy for automated trust negotiation over the Internet. In: Proceedings of the 7th ACM Conference on Computer and Communications Security. 2000, 210–219

    Google Scholar 

  15. He Y, Zhu M. A complete and efficient strategy based on Petri net in automated trust negotiation. In: Proceedings of the 2nd International Conference on Scalable Information Systems. 2007, 75

    Google Scholar 

  16. Yu T, Winslett M, Seamons K E. Interoperable strategies in automated trust negotiation. In: Proceedings of the 8th ACM Conference on Computer and Communications Security. 2001, 146–155

    Google Scholar 

  17. Liu X, Tang S, Huang Q, Yu Z W. An ontology-based approach to automated trust negotiation. Computer Standards and Interfaces, 2013, 36(1): 219–230

    Article  Google Scholar 

  18. Lu H, Liu B. DFANS: a highly efficient strategy for automated trust negotiation. Computers and Security, 2009, 28(7): 557–565

    Article  Google Scholar 

  19. Li N, DuW, Boneh D. Oblivious signature-based envelope. Distributed Computing, 2005, 17(4): 293–302

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bing Zeng.

Additional information

Bailing Liu is an associate professor in the School of Information and Management, Central China Normal University, China. She received the PhD degree in computer science from Huazhong University of Science and Technology, China. Her research interests include information security and privacy.

Yanhui Li is a professor and the vice dean of School of Information Management at Central China Normal University, China. He received the PhD degree in management science and engineering at Huazhong University of Science and Technology, China. His research interests are in the areas of logistics system engineering and supply chain management.

Bing Zeng received the BE degree in economics from Huazhong Agricultural University, China in 2004, and received the BE degree in computer science and technology, the ME degree and the PhD degree in information security from Huazhong University of Science and Technology, China in 2004, 2007 and 2012, respectively. He is currently an assistant professor at South China University of Technology, China. His research interests are cryptography and network security.

Chao Lei is a graduate of Central China Normal University, China. His major is management science and engineering.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, B., Li, Y., Zeng, B. et al. An efficient trust negotiation strategy towards the resource-limited mobile commerce environment. Front. Comput. Sci. 10, 543–558 (2016). https://doi.org/10.1007/s11704-015-4559-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11704-015-4559-2

Keywords

Navigation