Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

邮发代号 80-970

2019 Impact Factor: 1.275

Frontiers of Computer Science  2016, Vol. 10 Issue (3): 543-558   https://doi.org/10.1007/s11704-015-4559-2
  本期目录
An efficient trust negotiation strategy towards the resource-limited mobile commerce environment
Bailing LIU1,Yanhui LI1,Bing ZENG2,*(),Chao LEI1
1. School of Information Management, Central China Normal University, Wuhan 430079, China
2. School of Software Engineering, South China University of Technology, Guangzhou 510006, China
 全文: PDF(763 KB)  
Abstract

Automated trust negotiation (ATN) offers an attractive means for trust establishments, which establishes mutual trust among strangers wishing to share resources or conduct business, but it comes at the cost of non-trivial computation and communication overheads. The deployment of ATN strategies on a resource-constrained mobile device may lead to user-obstructive latency for operations. In this paper, we propose a trust negotiation strategy called trust target Petri nets negotiation strategy (TPNNS). It highly reduces the negotiation latency in the mobile device compared with other negotiation strategies, since it considers all the alternative responses at each step and chooses the best one. TPNNS supports cycle avoidance and employs skipped TPN which is a new approach presented in this paper. What is more, it is complete and ensures no irrelevant credentials are disclosed during the trust negotiation.

Key wordsautomated trust negotiation    mobile commerce    negotiation strategy    Petri net
收稿日期: 2014-12-08      出版日期: 2016-05-16
Corresponding Author(s): Bing ZENG   
 引用本文:   
. [J]. Frontiers of Computer Science, 2016, 10(3): 543-558.
Bailing LIU,Yanhui LI,Bing ZENG,Chao LEI. An efficient trust negotiation strategy towards the resource-limited mobile commerce environment. Front. Comput. Sci., 2016, 10(3): 543-558.
 链接本文:  
https://academic.hep.com.cn/fcs/CN/10.1007/s11704-015-4559-2
https://academic.hep.com.cn/fcs/CN/Y2016/V10/I3/543
1 Chong A Y L, Chan F T S, Ooi K B. Predicting consumer decisions to adopt mobile commerce: cross country empirical examination between china and malaysia. Decision Support Systems, 2012, 53(1): 34–43
2 Hoffman D L, Novak T P, Peralta M. Building consumer trust online. Communications of the ACM, 1999, 42(4): 80–85
3 Hu R B, Yang D L, Qi R H. Recommended trust evaluation model in mobile commerce based on combination evaluation mode. Operations Research and Management Science, 2010
4 Turban E, King D, King D, Lee J K, Marshall P, Lee J, McKay J. Electronic Commerce 2008: A Managerial Perspective. Englewood Cliffs, NJ: Prentice Hall, 2007
5 Siau K, Shen Z. Building customer trust in mobile commerce. Communications of the ACM, 2003, 46(4): 91–94
6 Luo X, Li H, Zhang J, Shim J P. Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking services. Decision Support Systems, 2010, 49(2): 222–234
7 Siau K, Sheng H, Nah F, Davis S. A qualitative investigation on consumer trust in mobile commerce. International Journal of Electronic Business, 2004, 2(3): 283–300
8 Winsborough W H, Seamons K E, Jones V E. Automated trust negotiation. In: Proceedings of DARPA Information Survivability Conference and Exposition. 2000, 88–102
9 Winsborough W H, Li N. Towards practical automated trust negotiation. In: Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks. 2002, 92–103
10 Kim H W, Chan H C,Gupta S. Value-based adoption of mobile internet: an empirical investigation. Decision Support Systems, 2007, 43(1): 111–126
11 Magura B. What hooks m-commerce customers? MIT Sloan Management Review, 2003, 44(3): 9
12 Mahatanankoon P, Wen H J, Lim B. Consumer-based m-commerce: exploring consumer perception of mobile applications. Computer Standards and Interfaces, 2005, 27(4): 347–357
13 Winslett M, Lee A J, Perano K J. Trust negotiation: authorization for virtual organizations. In: Proceedings of the 5th ACM Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies. 2009, 43
14 Yu T, Ma X, Winslett M. Prunes: an efficient and complete strategy for automated trust negotiation over the Internet. In: Proceedings of the 7th ACM Conference on Computer and Communications Security. 2000, 210–219
15 He Y, Zhu M. A complete and efficient strategy based on Petri net in automated trust negotiation. In: Proceedings of the 2nd International Conference on Scalable Information Systems. 2007, 75
16 Yu T, Winslett M, Seamons K E. Interoperable strategies in automated trust negotiation. In: Proceedings of the 8th ACM Conference on Computer and Communications Security. 2001, 146–155
17 Liu X, Tang S, Huang Q, Yu Z W. An ontology-based approach to automated trust negotiation. Computer Standards and Interfaces, 2013, 36(1): 219–230
18 Lu H, Liu B. DFANS: a highly efficient strategy for automated trust negotiation. Computers and Security, 2009, 28(7): 557–565
19 Li N, Du W, Boneh D. Oblivious signature-based envelope. Distributed Computing, 2005, 17(4): 293–302
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed