Computer Science ›› 2016, Vol. 43 ›› Issue (10): 160-165.doi: 10.11896/j.issn.1002-137X.2016.10.030

Previous Articles     Next Articles

Automated Trust Negotiation Protocol Based on Transactional Receipt in Mobile Commerce Environment

LIU Bai-ling, LEI Chao and LI Yan-hui   

  • Online:2018-12-01 Published:2018-12-01

Abstract: It is difficult to use trust negotiation in the mobile environment since existing trust negotiation mechanisms have large computational overhead.To address this problem,a transaction receipt-based mobile trust negotiation protocol was proposed.Firstly,both sides of the negotiation evaluate each other’s trust degree based on the transaction receipt.Secondly,they dynamicly adjust the access control policy on the basis of the evaluated trust degree.Finally,they enter into the digital certificate exchanging process,in which the number of certificate authentication is reduced by ta-king advantages of transaction receipt and authentication ticket.The experiments show that this protocol can effectively reduce computational overhead.

Key words: Mobile commerce,Automated trust negotiation,Negotiation efficiency,Trust degree evaluation

[1] Yuan Y F,Wang Y W,Xu Z C,et al.Mobile Commerce [M].Beijing:Tsinghua University Press,2006(in Chinese) 袁雨飞,王有为,胥正川,等.移动商务[M].北京:清华大学出版社,2006
[2] Zhou T,Lu Y B,Zhang J L.A study on acceptance behavior of mobile commerce user based on perceived walue and trust [J].Chinese Journal of Management,2009,6(10):1407-1412(in Chinese) 周涛,鲁耀斌,张金隆.基于感知价值的移动商务用户接受行为研究[J].管理学报,2009,6(10):1407-1412
[3] Hu R B,Yang D L,Qi R H.Recommended trust evaluationmodel in mobile commerce based on combination evaluation model [J].Operations Research and Management Science,2010,19(3):85-93(in Chinese) 胡润波,杨德礼,祁瑞华.移动商务中基于综合评价的推荐信任评估模型[J].运筹与管理,2010,19(3):85-93
[4] Hoffman D L,Novak T P,Peralta M.Building consumer trust online [J].Communications of the ACM,1999,42(4):80-85
[5] Turban E.Electronic Commerce:A Managerial Perspective[M].Beijing:Electronic Industry Press,2002(in Chinese) Turban E.电子商务——管理新视角(第二版)[M].北京:电子工业出版社,2002
[6] Zhou T,Lu Y B.The impact of privacy concern on mobile commerce users' adoption behavior [J].Chinese Journal of Management,2010,7(7):1046-1051(in Chinese) 周涛,鲁耀斌.隐私关注对移动商务用户采纳行为影响的实证分析[J].管理学报,2010,7(7):1046-1051
[7] Lu Y B,Deng Z H,Zhang S T.The acceptance of mobile micro-payment service:an empirical research based on trust-TAM [J].China Journal of Information Systems,2007,1(1):46-59(in Chinese) 鲁耀斌,邓朝华,章淑婷.基于Trust-TAM的移动商务服务消费者采纳研究[J].信息系统学报,2007,1(1):46-59
[8] Siau K,Shen Z.Building customer trust in mobile commerce[J].Communications of the ACM,2003,46(4):91-95
[9] Winsborough W H,Seamons K E,Jones V E.Automated trust negotiation [C]∥Proceedings of 2000 DARPA Information Survivability Conference and Exposition.Hilton Head,USA,Jan.2000:88-102
[10] Li J X,Huai J P,Li X X.Research on automated trust negotiation [J].Journal of Software,2006,17(1):124-133(in Chinese) 李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133
[11] Liao Z S,Jin H,Li C S,et al.Automated trust negotiation in its development trend [J].Journal of Software,2006,17(9):1933-1948(in Chinese) 廖振松,金海,李赤松,等.自动信任协商及其发展趋势[J].软件学报,2006,17(9):1933-1948
[12] Deng C H,Lu Y B.Research on mobile commerce trust establish ment framework based on VFT [J].Science and Technology Management Research,2008(3):680-683(in Chinese) 邓朝华,鲁耀斌.基于VFT的移动商务信任构建框架研究[J].科研管理研究,2008(3):680-683
[13] Zhang Y,Chen H J,Jiang X H,et al.A survey of trust management for e-commerce systems [J].Acta Electronica Sinica,2008,36(10):2011-2020(in Chinese) 张宇,陈华钧,姜晓红,等.电子商务系统信任管理研究综述[J].电子学报,2008,36(10):2011-2020
[14] Winslett M,Lee A J,Perano K J.Trust negotiation:authorization for virtual organizations [C]∥Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research.Knoxville,USA,2009:1-4
[15] Lin J B,Lu Y B,Zhang J L.An Empirical Study on Consumers′Trust of Mobile Stock Based on TAM Theory [J].Journal of Management Science,2009,22(5):61-71(in Chinese) 林家宝,鲁耀斌,张金隆.基于TAM的移动证券消费者信任实证研究[J].管理科学,2009,22(5):61-71
[16] Li J L,Deng X,Wang Y M.Security and efficiency negotiation model [J].Computer Science,2015,42(6):378-392(in Chinese) 李建利,邓潇,王艺谋.一种高效安全的自动信任协商模型[J].计算机科学,2015,2(6):378-392
[17] Bertino E,Ferrari E,Squicciarini A C.Trust-X:a peer to peer framework for trust negotiations[J].IEEE Transaction on Knowledge and Data Engineering,2004,16(7):827-842
[18] Squicciarini A,Bertino E,Ferrari E,et al.PP-Trust-X:a system for privacy preserving trust negotiations [J].ACM Transactions on Information and System Security,2007,10(3):1-48
[19] Lu H W,Liu B L.DFANS:A Highly Efficient Strategy for Automated Trust Negotiation[J].Computers & Security,2009,28(7):557-565
[20] Li N H,Du W L,Dan B.Oblivious Signature-Based Envelope[C]∥Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing (PODC 2003).New York:ACM Press,2003:182-189
[21] Li J X,Huai J P.COTN:A Contract-Based Trust Negotiation System [J].Chinese Journal of Computers,2006,29(8):1290-1299(in Chinese) 李建欣,怀进鹏.COTN:基于契约的信任协商系统[J].计算机学报,2006,29(8):1290-1299
[22] Li J L,Liu B,Deng X.Finite Automaton Based Strategy for Automated Trust Negotiation [J].Journal of Chinese Computer Systems,2013,4(6):1000-1220(in Chinese) 李建利,刘博,邓潇.基于有穷自动机的自动信任协商策略[J].小型微型计算机系统,2013,4(6):1000-1220
[23] Wang Q Y,Jiang W B,Wang H.Scheme of Attribute-Based Disclosure Mobile Trust Negotiation [J].Telecommunication Scien-ce,2013(10):103-107(in Chinese) 汪秋云,蒋文保,王鸿.基于属性披露的移动信任协商方案[J].电信科学,2013(10):103-107

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .