Research Article
A Deep Learning-Based Trust Assessment Method for Cloud Users
Table 4
Comparisons of different methods.
| ā | Special hardware required | Trust of users | Behavioural sensitiveness | Behavioural comprehensiveness | Technical features |
| Trusted computing-based methods | Yes | No | No | No | Transitive trust | Learning-based methods | Other schemes [34, 37] | No | Yes | Yes | No | Binary classification | Our method | No | Yes | Yes | Yes | Real-time trust assessment |
|
|