{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:10:47Z","timestamp":1771657847347,"version":"3.50.1"},"reference-count":35,"publisher":"Zhejiang University Press","issue":"3","license":[{"start":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T00:00:00Z","timestamp":1610064000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T00:00:00Z","timestamp":1610064000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front Inform Technol Electron Eng"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1631\/fitee.1900636","type":"journal-article","created":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T12:06:37Z","timestamp":1610107597000},"page":"374-399","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["EdgeKeeper: a trusted edge computing framework for ubiquitous power Internet of Things","EdgeKeeper:\u4e00\u79cd\u9002\u5e94\u6cdb\u5728\u7535\u529b\u7269\u8054\u7f51\u7684\u53ef\u4fe1\u8fb9\u7f18\u8ba1\u7b97\u6846\u67b6"],"prefix":"10.1631","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8430-9168","authenticated-orcid":false,"given":"Weiyong","family":"Yang","sequence":"first","affiliation":[]},{"given":"Wei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xingshen","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Zixin","family":"Guo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7646-4336","authenticated-orcid":false,"given":"Kangle","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Longyun","family":"Qi","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2021,1,8]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/sec.2018.00015"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.07.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/sec.2018.00024"},{"key":"ref4","author":"Boutaud","year":"1991","journal-title":"Series Maxium\/Minimum Function Computing Devices, Systems and Methods."},{"issue":"6","key":"ref5","first-page":"1715","article-title":"Novel edge-ware adaptive data processing method for the ubiquitous electric power Internet of Things","volume":"45","author":"Cai","year":"2019","journal-title":"High Volt Eng"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/sec.2018.00027"},{"issue":"17","key":"ref7","first-page":"32","article-title":"Analysis of distributed power distribution fault processing based on edge computing","volume-title":"Electromech Inform","author":"Chen","year":"2019"},{"key":"ref8","article-title":"Edge Computing Consortium","volume-title":"Edge Computing Reference Architecture 3.0.","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/sec.2018.00018"},{"key":"ref10","author":"Fultz","year":"2010","journal-title":"Rules Engine Architecture and Implementation."},{"issue":"11","key":"ref11","article-title":"Mobile Edge Computing-A Key Technology Towards 5G","volume-title":"ETSI White Paper","author":"Hu","year":"2015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/sec.2018.00017"},{"issue":"1","key":"ref13","first-page":"196","article-title":"Review on data forwarding model in Internet of Things","volume":"29","author":"Li","year":"2018","journal-title":"J Softw"},{"issue":"3","key":"ref14","first-page":"26","article-title":"The overview of technologies and applications for industrial IOT","author":"Li","year":"2014","journal-title":"Telecommun Netw Technol"},{"issue":"3","key":"ref15","first-page":"8","article-title":"The present situation of open source platforms for edge computing","volume":"25","author":"Liang","year":"2019","journal-title":"ZTE Technol"},{"issue":"6","key":"ref16","first-page":"1707","article-title":"Internet of Things technology application and prospects in distribution transformer service area management","volume":"45","author":"Liu","year":"2019","journal-title":"High Volt Eng"},{"key":"ref17","volume-title":"Fog computing: focusing on mobile users at the edge.","author":"Luan","year":"2015"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2017.2682318"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/sec.2018.00028"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2017.2745201"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2017.9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/cloud.2015.147"},{"issue":"7","key":"ref23","first-page":"1863","article-title":"Leakage perception method for backdoor privacy in industry Internet of Things environment","volume":"29","author":"Sha","year":"2018","journal-title":"J Softw"},{"issue":"1","key":"ref24","first-page":"1","article-title":"Architecture of Internet of Things and its standardization","volume":"35","author":"Shen","year":"2015","journal-title":"J Nanjing Univ Post Telecommun (Nat Sci)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2016.145"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2016.2579198"},{"issue":"5","key":"ref27","first-page":"907","article-title":"Edge computing-an emerging computing model for the Internet of Everything era","volume":"54","author":"Shi","year":"2017","journal-title":"J Comput Res Dev"},{"issue":"4","key":"ref28","first-page":"817","article-title":"Secure data fusion method based on supervisory mechanism for industrial Internet of Things","volume":"34","author":"Wang","year":"2013","journal-title":"Chin J Sci Instrum"},{"issue":"11","key":"ref29","first-page":"190","article-title":"Implementation of edge calculation in motor monitoring system","author":"Xu","year":"2019","journal-title":"Electron Technol Soft Eng"},{"issue":"11","key":"ref30","first-page":"22","article-title":"Research on power private micro kernel-based secure operating system technology","volume":"14","author":"Yang","year":"2016","journal-title":"Electron Power Inform Commun Technol"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/icei.2019.00038"},{"issue":"3","key":"ref32","first-page":"64","article-title":"Research on industrial Internet of Things security and protection technology","volume":"5","author":"Yang","year":"2015","journal-title":"Int Things Technol"},{"issue":"10","key":"ref33","first-page":"124","article-title":"Research and application of industrial data acquisition based on industrial Internet of Things","volume":"34","author":"Zhang","year":"2018","journal-title":"Telecommun Sci"},{"issue":"7","key":"ref34","first-page":"32","article-title":"GE Industrial Internet five years","volume-title":"Chin Ind Inform Technol","author":"Zhou","year":"2018"},{"issue":"8","key":"ref35","first-page":"88","article-title":"Analysis of industrial Internet of Things technology in smart factory","volume-title":"Style Sci Technol","author":"Zuo","year":"2019"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1900636.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1900636\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1900636.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:37:26Z","timestamp":1771655846000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1900636"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,8]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["1610"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1900636","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,8]]},"assertion":[{"value":"20 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Weiyong YANG, Wei LIU, Xingshen WEI, Zixin GUO, Kangle YANG, Hao HUANG, and Longyun QI declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethics guidelines"}}]}}