Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT
Este informe presenta los avances de un proyecto de investigación enfocado en proteger la propiedad intelectual del código fuente de los trabajos de grado de estudiantes de Ingeniería de Sistemas de la Universidad El Bosque. El proyecto propone el uso de tecnología Blockchain y Tokens No Fungibles (...
- Autores:
-
Morillo Ledezma, Génesis Gabriela
Ruiz Roa, Miguel Angel
- Tipo de recurso:
- https://purl.org/coar/resource_type/c_7a1f
- Fecha de publicación:
- 2025
- Institución:
- Universidad El Bosque
- Repositorio:
- Repositorio U. El Bosque
- Idioma:
- spa
- OAI Identifier:
- oai:repositorio.unbosque.edu.co:20.500.12495/14596
- Acceso en línea:
- https://hdl.handle.net/20.500.12495/14596
- Palabra clave:
- Blockchain
Protección de datos
Certificados digitales
Tokens no fungibles (NFTs)
Código fuente
621.3
Blockchain
Data protection
Digital certificates
Non-fungible tokens (NFTs)
Source code
- Rights
- closedAccess
- License
- Acceso cerrado
id |
UNBOSQUE2_d3c6176a9ae957f9318d9265b5e42571 |
---|---|
oai_identifier_str |
oai:repositorio.unbosque.edu.co:20.500.12495/14596 |
network_acronym_str |
UNBOSQUE2 |
network_name_str |
Repositorio U. El Bosque |
repository_id_str |
|
dc.title.none.fl_str_mv |
Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT |
dc.title.translated.none.fl_str_mv |
Securing the source code of graduate work using non-fungible token technology-NFT |
title |
Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT |
spellingShingle |
Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT Blockchain Protección de datos Certificados digitales Tokens no fungibles (NFTs) Código fuente 621.3 Blockchain Data protection Digital certificates Non-fungible tokens (NFTs) Source code |
title_short |
Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT |
title_full |
Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT |
title_fullStr |
Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT |
title_full_unstemmed |
Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT |
title_sort |
Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT |
dc.creator.fl_str_mv |
Morillo Ledezma, Génesis Gabriela Ruiz Roa, Miguel Angel |
dc.contributor.advisor.none.fl_str_mv |
Ramírez López, Leonardo Juan |
dc.contributor.author.none.fl_str_mv |
Morillo Ledezma, Génesis Gabriela Ruiz Roa, Miguel Angel |
dc.subject.none.fl_str_mv |
Blockchain Protección de datos Certificados digitales Tokens no fungibles (NFTs) Código fuente |
topic |
Blockchain Protección de datos Certificados digitales Tokens no fungibles (NFTs) Código fuente 621.3 Blockchain Data protection Digital certificates Non-fungible tokens (NFTs) Source code |
dc.subject.ddc.none.fl_str_mv |
621.3 |
dc.subject.keywords.none.fl_str_mv |
Blockchain Data protection Digital certificates Non-fungible tokens (NFTs) Source code |
description |
Este informe presenta los avances de un proyecto de investigación enfocado en proteger la propiedad intelectual del código fuente de los trabajos de grado de estudiantes de Ingeniería de Sistemas de la Universidad El Bosque. El proyecto propone el uso de tecnología Blockchain y Tokens No Fungibles (NFTs) para crear certificados digitales que garanticen la autenticidad e integridad del software entregado por los estudiantes. Se estructura bajo la metodología Scrum y se enmarca en el macroproyecto TestBed-UB. El sistema desarrollado se basa en una arquitectura Blockchain multichain, que permite registrar, verificar y certificar digitalmente los códigos fuente. Se detallan los requerimientos funcionales (como autenticación, gestión de usuarios, emisión y verificación de certificados NFT) y no funcionales (seguridad, escalabilidad, usabilidad). Además, se aplica el Modelo Biopsicosocial y Cultural (MBPSC) para analizar el impacto de la solución en los actores involucrados (estudiantes, comité de grado y grupo de investigación). A la fecha, se han desarrollado la arquitectura, interfaz de usuario, y contratos inteligentes. Resta completar las pruebas, validación y despliegue final. Se concluye que la solución basada en Blockchain y NFTs ofrece una protección robusta frente a plagio y acceso no autorizado, fortaleciendo la confianza en el proceso académico. El proyecto propone la redacción de un artículo final de resultados para su publicación académica. |
publishDate |
2025 |
dc.date.accessioned.none.fl_str_mv |
2025-06-09T15:03:19Z |
dc.date.available.none.fl_str_mv |
2025-06-09T15:03:19Z |
dc.date.issued.none.fl_str_mv |
2025-05 |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_7a1f |
dc.type.local.spa.fl_str_mv |
Tesis/Trabajo de grado - Monografía - Pregrado |
dc.type.coar.none.fl_str_mv |
https://purl.org/coar/resource_type/c_7a1f |
dc.type.driver.none.fl_str_mv |
info:eu-repo/semantics/bachelorThesis |
dc.type.coarversion.none.fl_str_mv |
https://purl.org/coar/version/c_ab4af688f83e57aa |
format |
https://purl.org/coar/resource_type/c_7a1f |
dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/20.500.12495/14596 |
dc.identifier.instname.spa.fl_str_mv |
instname:Universidad El Bosque |
dc.identifier.reponame.spa.fl_str_mv |
reponame:Repositorio Institucional Universidad El Bosque |
dc.identifier.repourl.none.fl_str_mv |
repourl:https://repositorio.unbosque.edu.co |
url |
https://hdl.handle.net/20.500.12495/14596 |
identifier_str_mv |
instname:Universidad El Bosque reponame:Repositorio Institucional Universidad El Bosque repourl:https://repositorio.unbosque.edu.co |
dc.language.iso.fl_str_mv |
spa |
language |
spa |
dc.relation.references.none.fl_str_mv |
[1]Md. M. Islam and H. P. In, “Decentralized Global Copyright System Based on Consortium Blockchain With Proof of Authority,” IEEE Access, vol. 11, pp. 43101–43115, 2023, doi: 10.1109/ACCESS.2023.3270627. [2]X. Wen, “Application of blockchain technology in copyright protection of digital music information,” International Journal of Grid and Utility Computing, vol. 14, no. 2/3, p. 136, 2023, doi: 10.1504/IJGUC.2023.131015. [3]V. Tanwar and K. R. Ramkumar, “An Analysis of Blockchain and NFT Technologies and their Drawbacks,” in 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC), IEEE, May 2023, pp. 1251–1259. doi: 10.1109/ICAAIC56838.2023.10140828. [4]P. J. Taylor, T. Dargahi, A. Dehghantanha, R. M. Parizi, and K.-K. R. Choo, “A systematic literature review of blockchain cyber security,” Digital Communications and Networks, vol. 6, no. 2, pp. 147–156, May 2020, doi: 10.1016/j.dcan.2019.01.005. [5]H. Xu, W. Liu, and X. Liu, “Blockchain-Based Trust Auction for Dynamic Virtual Machine Provisioning and Allocation in Clouds,” Wireless Communications and Mobile Computing, vol. 2021, pp. 1–10, Jun. 2021, doi: 10.1155/2021/6639107. [6]A. Mishra, S. Karmakar, A. Dutta, A. Bose, and M. Mohapatro, “Design and Deployment of IoT enabled Blockchain based resilient Supply-chain Management System using Ethereum,” International Journal of Computing and Digital Systems, vol. 12, no. 4, pp. 1029–1050, Oct. 2022, doi: 10.12785/ijcds/120183. [7]R. Zhang, R. Xue, and L. Liu, “Security and Privacy on Blockchain,” ACM Computing Surveys, vol. 52, no. 3, pp. 1–34, May 2020, doi: 10.1145/3316481. [8]H. Guo and X. Yu, “A survey on blockchain technology and its security,” Blockchain: Research and Applications, vol. 3, no. 2, p. 100067, Jun. 2022, doi: 10.1016/j.bcra.2022.100067. [9]N. Jing, Q. Liu, and V. Sugumaran, “A blockchain-based code copyright management system,” Information Processing Management, vol. 58, no. 3, p. 102518, May 2021, doi: 10.1016/j.ipm.2021.102518. [10]F. Ullah and F. Al-Turjman, “A conceptual framework for blockchain smart contract adoption to manage real estate deals in smart cities,” Neural Computing and Applications, vol. 35, no. 7, pp. 5033–5054, Mar. 2023, doi: 10.1007/s00521-021-05800-6. [11]H. Han, R. K. Shiwakoti, R. Jarvis, C. Mordi, and D. Botchie, “Accounting and auditing with blockchain technology and artificial Intelligence: A literature review,” International Journal of Accounting Information Systems, vol. 48, p. 100598, Mar. 2023, doi: 10.1016/j.accinf.2022.100598. [12]R. A. Koussema and H. Haga, “Highly Secure Residents Life Event Mana- gement System Based on Blockchain by Hyperledger Fabric,” Journal of Computer and Communications, vol. 09, no. 09, 2021, doi: 10.4236/jcc.2021.99003. [13]J. Panduro-Ramirez, M. Lourens, A. Gehlot, D. P. Singh, Y. Singh, and D.J. Salunke, “Blockchain Approach for Implementing Access Control In IOT,” in 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), IEEE, Jan. 2023, pp. 596–599. doi: 10.1109/AISC56616.2023.10085452. [14]S. Wang et al., “Blockchain Smart Contract Virtual Machine Optimization Technology for Domain Name Systems,” in 2021 IEEE International Conference on Industrial Application of Artificial Intelligence (IAAI), IEEE, Dec. 2021, pp. 445–451. doi: 10.1109/IAAI54625.2021.9699960. [15]J. Arcenegui, R. Arjona, and I. Baturone, “Secure Management of IoT Devices Based on Blockchain Non-fungible Tokens and Physical Unclonable Functions,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12418 LNCS, 2020, pp. 24–40. doi: 10.1007/978-3-030-61638-02. [16]S. Karagwal, S. Tanwar, S. Badotra, A. Rana, and V. Jain, “Blockchain for Internet of Things (IoT): Research Issues, Challenges, and Future Directions,” in EAI/Springer Innovations in Communication and Computing, 2023, pp. 15–34. doi: 10.1007/978-3-031-04524-02. [17]N. Kumar, V. Goel, R. Ranjan, M. Altuwairiqi, H. Alyami, and S. A. Asakipaam, “A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City,” Security and Com- munication Networks, vol. 2023, pp. 1–13, Apr. 2023, doi: 10.1155/2023/8168075. [18]D. L. Fekete and A. Kiss, “Toward Building Smart Contract-Based Higher Education Systems Using Zero-Knowledge Ethereum Virtual Machine,” Electro- nics (Switzerland), vol. 12, no. 3, 2023, doi: 10.3390/electronics12030664. [19]M. Zichichi, G. D’Angelo, S. Ferretti, and M. Marzolla, “Accountable Clouds Through Blockchain,” IEEE Access, vol. 11, pp. 48358–48374, 2023, doi: 10.1109/ACCESS.2023.3276240. [20]K. Ko, T. Jeong, J. Woo, and J. W. Hong, “Survey on blockchain‐based non‐fungible tokens: History, technologies, standards, and open challenges,” International Journal of Network Management, vol. 34, no. 1, Jan. 2024, doi: 10.1002/nem.2245. [21]C. G. Kim, “A Study on Technology to Counter Copyright Infringement According to NFT Transaction Types,” Journal of the Semiconductor Display Technology, vol. 20, no. 4, 2021. [22]R. Qin, J. Li, X. Wang, J. Zhu, Y. Yuan, and F. Y. Wang, “NFT: blockchain- based non-fungible token and applications,” Chinese Journal of Intelligent Science and Technology, vol. 3, no. 2, 2021, doi: 10.11959/j.issn.2096-6652.202125. [23] E. Borandag, “A Blockchain-Based Recycling Platform Using Image Processing, QR Codes, and IoT System,” Sustainability (Switzerland), vol. 15, no. 7, 2023, doi: 10.3390/su15076116. [24] R. Kräussl and A. Tugnetti, “Non-Fungible Tokens (NFTs): A Review of Pricing Determinants, Applications and Opportunities,” Journal of Economic Surveys, vol. 38, no. 2, 2024, doi: 10.1111/joes.12597. [25] R. Kräussl and A. Tugnetti, “Non-Fungible Tokens (NFTs): A Review of Pricing Determinants, Applications and Opportunities,” Journal of Economic Surveys, vol. 38, no. 2, 2024, doi: 10.1111/joes.12597. [26] S. Zhao, Z. Zeng, J. Peng, and F. Yu, “Achieving a Secure and Traceable High-Definition Multimedia Data Trading Scheme Based on Blockchain,” Mathematics, vol. 11, no. 10, 2023, doi: 10.3390/math11102224. [27] E. Borandag, “A Blockchain-Based Recycling Platform Using Image Processing, QR Codes, and IoT System,” Sustainability (Switzerland), vol. 15, no. 7, 2023, doi: 10.3390/su15076116. [28]J. Bellagarda and A. M. Abu-Mahfouz, “Connect2NFT: A Web-Based, Blockchain Enabled NFT Application with the Aim of Reducing Fraud and En- suring Authenticated Social, Non-Human Verified Digital Identity,” Mathematics, vol. 10, no. 21, p. 3934, Oct. 2022, doi: 10.3390/math10213934. [29]H. Taherdoost, “Non-Fungible Tokens (NFT): A Systematic Review,” In- formation (Switzerland), vol. 14, no. 1. 2023. doi: 10.3390/info14010026. [30]M. K. Hari, A. Agrawal, R. Bhatia, A. Bhatia, and K. Tiwari, “T-PASS: A Blockchain-based NFT Enabled Property Management and Exchange System,” in 2023 International Conference on Information Networking (ICOIN), IEEE, Jan. 2023, pp. 140–145. doi: 10.1109/ICOIN56518.2023.10048973. [31]C. Chen, H. Huang, B. Zhao, D. Shu, and Y. Wang, “The Research of AHP- Based Credit Rating System on a Blockchain Application,” Electronics (Switzer- land), vol. 12, no. 4, 2023, doi: 10.3390/electronics12040887. |
dc.rights.local.spa.fl_str_mv |
Acceso cerrado |
dc.rights.accessrights.none.fl_str_mv |
info:eu-repo/semantics/closedAccess http://purl.org/coar/access_right/c_14cb |
rights_invalid_str_mv |
Acceso cerrado http://purl.org/coar/access_right/c_14cb |
eu_rights_str_mv |
closedAccess |
dc.format.mimetype.none.fl_str_mv |
application/pdf |
dc.publisher.program.spa.fl_str_mv |
Ingeniería de Sistemas |
dc.publisher.grantor.spa.fl_str_mv |
Universidad El Bosque |
dc.publisher.faculty.spa.fl_str_mv |
Facultad de Ingeniería |
institution |
Universidad El Bosque |
bitstream.url.fl_str_mv |
https://repositorio.unbosque.edu.co/bitstreams/d58b87db-1882-4002-9e8d-356e3fc14b7c/download https://repositorio.unbosque.edu.co/bitstreams/d77e9198-1f36-41c7-a6ee-1d2fec0a0b1a/download https://repositorio.unbosque.edu.co/bitstreams/3b8a8146-f1d5-4cea-8b18-9d6f7a976995/download https://repositorio.unbosque.edu.co/bitstreams/84163354-8efb-45e2-ae24-be17e2194325/download https://repositorio.unbosque.edu.co/bitstreams/ac3b8143-2766-4738-a507-35743dc3b3e5/download https://repositorio.unbosque.edu.co/bitstreams/30f81af5-6778-4511-90b3-966db31b5f77/download https://repositorio.unbosque.edu.co/bitstreams/51e1d83c-3d1f-4db7-b4be-58e5cfa10cc5/download https://repositorio.unbosque.edu.co/bitstreams/41144146-c91d-4d5b-a84e-3db877f981df/download https://repositorio.unbosque.edu.co/bitstreams/d8caa2a7-31b8-41d0-b426-537020a1c0ba/download https://repositorio.unbosque.edu.co/bitstreams/593524b5-138b-4fb8-bde3-02f905dd9bb8/download |
bitstream.checksum.fl_str_mv |
5c46c60023f09bee4ed371819a3ce82e ef9180555c288b78cd79594a02c5b5ef 17cc15b951e7cc6b3728a574117320f9 41df5fe15be04ba62f37c27541d997f4 1c31826817714db232e96c96c32613a0 3b6ce8e9e36c89875e8cf39962fe8920 c6ad87fef7eecc23b5b49efbd115682d d93c12127ff1a29be3d94b5e5925d23f 0a4b3684fa26afc41ee57e355a130db9 dcebecfa5e9ee335bf0b36c719cc43c1 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional Universidad El Bosque |
repository.mail.fl_str_mv |
bibliotecas@biteca.com |
_version_ |
1836752266459086848 |
spelling |
Ramírez López, Leonardo JuanMorillo Ledezma, Génesis GabrielaRuiz Roa, Miguel Angel2025-06-09T15:03:19Z2025-06-09T15:03:19Z2025-05https://hdl.handle.net/20.500.12495/14596instname:Universidad El Bosquereponame:Repositorio Institucional Universidad El Bosquerepourl:https://repositorio.unbosque.edu.coEste informe presenta los avances de un proyecto de investigación enfocado en proteger la propiedad intelectual del código fuente de los trabajos de grado de estudiantes de Ingeniería de Sistemas de la Universidad El Bosque. El proyecto propone el uso de tecnología Blockchain y Tokens No Fungibles (NFTs) para crear certificados digitales que garanticen la autenticidad e integridad del software entregado por los estudiantes. Se estructura bajo la metodología Scrum y se enmarca en el macroproyecto TestBed-UB. El sistema desarrollado se basa en una arquitectura Blockchain multichain, que permite registrar, verificar y certificar digitalmente los códigos fuente. Se detallan los requerimientos funcionales (como autenticación, gestión de usuarios, emisión y verificación de certificados NFT) y no funcionales (seguridad, escalabilidad, usabilidad). Además, se aplica el Modelo Biopsicosocial y Cultural (MBPSC) para analizar el impacto de la solución en los actores involucrados (estudiantes, comité de grado y grupo de investigación). A la fecha, se han desarrollado la arquitectura, interfaz de usuario, y contratos inteligentes. Resta completar las pruebas, validación y despliegue final. Se concluye que la solución basada en Blockchain y NFTs ofrece una protección robusta frente a plagio y acceso no autorizado, fortaleciendo la confianza en el proceso académico. El proyecto propone la redacción de un artículo final de resultados para su publicación académica.Grupo deinvestigaicón OSIRIS & BIOAXISIngeniero de SistemasPregradoThis report presents the progress of a research project focused on protecting the intellectual property of source code submitted by Systems Engineering students at Universidad El Bosque. The project employs Blockchain technology and Non-Fungible Tokens (NFTs) to create digital certificates that ensure the authenticity and integrity of the submitted software. The initiative is part of the TestBed-UB macroproject and follows the Scrum methodology. The system is based on a multichain Blockchain architecture, enabling the secure registration, verification, and certification of source code. Functional requirements (such as authentication, user management, and NFT-based certificate generation and validation) and non-functional requirements (including security, scalability, and usability) are thoroughly defined. The Biopsychosocial and Cultural Model (MBPSC) is used to assess the solution’s impact on key stakeholders (students, thesis committee, and research group). To date, the architecture, user interface, and smart contracts have been developed, with testing, validation, and final deployment still pending. The findings confirm that a Blockchain and NFT-based system provides a robust mechanism against plagiarism and unauthorized access, enhancing trust in the academic process. The next steps include writing and submitting a final research article to an academic journal.application/pdfBlockchainProtección de datosCertificados digitalesTokens no fungibles (NFTs)Código fuente621.3BlockchainData protectionDigital certificatesNon-fungible tokens (NFTs)Source codeAsegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFTSecuring the source code of graduate work using non-fungible token technology-NFTIngeniería de SistemasUniversidad El BosqueFacultad de IngenieríaTesis/Trabajo de grado - Monografía - Pregradohttps://purl.org/coar/resource_type/c_7a1fhttp://purl.org/coar/resource_type/c_7a1finfo:eu-repo/semantics/bachelorThesishttps://purl.org/coar/version/c_ab4af688f83e57aa[1]Md. M. Islam and H. P. In, “Decentralized Global Copyright System Based on Consortium Blockchain With Proof of Authority,” IEEE Access, vol. 11, pp. 43101–43115, 2023, doi: 10.1109/ACCESS.2023.3270627.[2]X. Wen, “Application of blockchain technology in copyright protection of digital music information,” International Journal of Grid and Utility Computing, vol. 14, no. 2/3, p. 136, 2023, doi: 10.1504/IJGUC.2023.131015.[3]V. Tanwar and K. R. Ramkumar, “An Analysis of Blockchain and NFT Technologies and their Drawbacks,” in 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC), IEEE, May 2023, pp. 1251–1259. doi: 10.1109/ICAAIC56838.2023.10140828.[4]P. J. Taylor, T. Dargahi, A. Dehghantanha, R. M. Parizi, and K.-K. R. Choo, “A systematic literature review of blockchain cyber security,” Digital Communications and Networks, vol. 6, no. 2, pp. 147–156, May 2020, doi: 10.1016/j.dcan.2019.01.005.[5]H. Xu, W. Liu, and X. Liu, “Blockchain-Based Trust Auction for Dynamic Virtual Machine Provisioning and Allocation in Clouds,” Wireless Communications and Mobile Computing, vol. 2021, pp. 1–10, Jun. 2021, doi: 10.1155/2021/6639107.[6]A. Mishra, S. Karmakar, A. Dutta, A. Bose, and M. Mohapatro, “Design and Deployment of IoT enabled Blockchain based resilient Supply-chain Management System using Ethereum,” International Journal of Computing and Digital Systems, vol. 12, no. 4, pp. 1029–1050, Oct. 2022, doi: 10.12785/ijcds/120183.[7]R. Zhang, R. Xue, and L. Liu, “Security and Privacy on Blockchain,” ACM Computing Surveys, vol. 52, no. 3, pp. 1–34, May 2020, doi: 10.1145/3316481.[8]H. Guo and X. Yu, “A survey on blockchain technology and its security,” Blockchain: Research and Applications, vol. 3, no. 2, p. 100067, Jun. 2022, doi: 10.1016/j.bcra.2022.100067.[9]N. Jing, Q. Liu, and V. Sugumaran, “A blockchain-based code copyright management system,” Information Processing Management, vol. 58, no. 3, p. 102518, May 2021, doi: 10.1016/j.ipm.2021.102518.[10]F. Ullah and F. Al-Turjman, “A conceptual framework for blockchain smart contract adoption to manage real estate deals in smart cities,” Neural Computing and Applications, vol. 35, no. 7, pp. 5033–5054, Mar. 2023, doi: 10.1007/s00521-021-05800-6.[11]H. Han, R. K. Shiwakoti, R. Jarvis, C. Mordi, and D. Botchie, “Accounting and auditing with blockchain technology and artificial Intelligence: A literature review,” International Journal of Accounting Information Systems, vol. 48, p. 100598, Mar. 2023, doi: 10.1016/j.accinf.2022.100598.[12]R. A. Koussema and H. Haga, “Highly Secure Residents Life Event Mana- gement System Based on Blockchain by Hyperledger Fabric,” Journal of Computer and Communications, vol. 09, no. 09, 2021, doi: 10.4236/jcc.2021.99003.[13]J. Panduro-Ramirez, M. Lourens, A. Gehlot, D. P. Singh, Y. Singh, and D.J. Salunke, “Blockchain Approach for Implementing Access Control In IOT,” in 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), IEEE, Jan. 2023, pp. 596–599. doi: 10.1109/AISC56616.2023.10085452.[14]S. Wang et al., “Blockchain Smart Contract Virtual Machine Optimization Technology for Domain Name Systems,” in 2021 IEEE International Conference on Industrial Application of Artificial Intelligence (IAAI), IEEE, Dec. 2021, pp. 445–451. doi: 10.1109/IAAI54625.2021.9699960.[15]J. Arcenegui, R. Arjona, and I. Baturone, “Secure Management of IoT Devices Based on Blockchain Non-fungible Tokens and Physical Unclonable Functions,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12418 LNCS, 2020, pp. 24–40. doi: 10.1007/978-3-030-61638-02.[16]S. Karagwal, S. Tanwar, S. Badotra, A. Rana, and V. Jain, “Blockchain for Internet of Things (IoT): Research Issues, Challenges, and Future Directions,” in EAI/Springer Innovations in Communication and Computing, 2023, pp. 15–34. doi: 10.1007/978-3-031-04524-02.[17]N. Kumar, V. Goel, R. Ranjan, M. Altuwairiqi, H. Alyami, and S. A. Asakipaam, “A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City,” Security and Com- munication Networks, vol. 2023, pp. 1–13, Apr. 2023, doi: 10.1155/2023/8168075.[18]D. L. Fekete and A. Kiss, “Toward Building Smart Contract-Based Higher Education Systems Using Zero-Knowledge Ethereum Virtual Machine,” Electro- nics (Switzerland), vol. 12, no. 3, 2023, doi: 10.3390/electronics12030664.[19]M. Zichichi, G. D’Angelo, S. Ferretti, and M. Marzolla, “Accountable Clouds Through Blockchain,” IEEE Access, vol. 11, pp. 48358–48374, 2023, doi: 10.1109/ACCESS.2023.3276240.[20]K. Ko, T. Jeong, J. Woo, and J. W. Hong, “Survey on blockchain‐based non‐fungible tokens: History, technologies, standards, and open challenges,” International Journal of Network Management, vol. 34, no. 1, Jan. 2024, doi: 10.1002/nem.2245.[21]C. G. Kim, “A Study on Technology to Counter Copyright Infringement According to NFT Transaction Types,” Journal of the Semiconductor Display Technology, vol. 20, no. 4, 2021.[22]R. Qin, J. Li, X. Wang, J. Zhu, Y. Yuan, and F. Y. Wang, “NFT: blockchain- based non-fungible token and applications,” Chinese Journal of Intelligent Science and Technology, vol. 3, no. 2, 2021, doi: 10.11959/j.issn.2096-6652.202125.[23] E. Borandag, “A Blockchain-Based Recycling Platform Using Image Processing, QR Codes, and IoT System,” Sustainability (Switzerland), vol. 15, no. 7, 2023, doi: 10.3390/su15076116.[24] R. Kräussl and A. Tugnetti, “Non-Fungible Tokens (NFTs): A Review of Pricing Determinants, Applications and Opportunities,” Journal of Economic Surveys, vol. 38, no. 2, 2024, doi: 10.1111/joes.12597.[25] R. Kräussl and A. Tugnetti, “Non-Fungible Tokens (NFTs): A Review of Pricing Determinants, Applications and Opportunities,” Journal of Economic Surveys, vol. 38, no. 2, 2024, doi: 10.1111/joes.12597.[26] S. Zhao, Z. Zeng, J. Peng, and F. Yu, “Achieving a Secure and Traceable High-Definition Multimedia Data Trading Scheme Based on Blockchain,” Mathematics, vol. 11, no. 10, 2023, doi: 10.3390/math11102224.[27] E. Borandag, “A Blockchain-Based Recycling Platform Using Image Processing, QR Codes, and IoT System,” Sustainability (Switzerland), vol. 15, no. 7, 2023, doi: 10.3390/su15076116.[28]J. Bellagarda and A. M. Abu-Mahfouz, “Connect2NFT: A Web-Based, Blockchain Enabled NFT Application with the Aim of Reducing Fraud and En- suring Authenticated Social, Non-Human Verified Digital Identity,” Mathematics, vol. 10, no. 21, p. 3934, Oct. 2022, doi: 10.3390/math10213934.[29]H. Taherdoost, “Non-Fungible Tokens (NFT): A Systematic Review,” In- formation (Switzerland), vol. 14, no. 1. 2023. doi: 10.3390/info14010026.[30]M. K. Hari, A. Agrawal, R. Bhatia, A. Bhatia, and K. Tiwari, “T-PASS: A Blockchain-based NFT Enabled Property Management and Exchange System,” in 2023 International Conference on Information Networking (ICOIN), IEEE, Jan. 2023, pp. 140–145. doi: 10.1109/ICOIN56518.2023.10048973.[31]C. Chen, H. Huang, B. Zhao, D. Shu, and Y. Wang, “The Research of AHP- Based Credit Rating System on a Blockchain Application,” Electronics (Switzer- land), vol. 12, no. 4, 2023, doi: 10.3390/electronics12040887.Acceso cerradoinfo:eu-repo/semantics/closedAccesshttp://purl.org/coar/access_right/c_14cbspaORIGINALTrabajo de grado.pdfTrabajo de grado.pdfapplication/pdf2073466https://repositorio.unbosque.edu.co/bitstreams/d58b87db-1882-4002-9e8d-356e3fc14b7c/download5c46c60023f09bee4ed371819a3ce82eMD54Anexos 2.pdfAnexos 2.pdfapplication/pdf406126https://repositorio.unbosque.edu.co/bitstreams/d77e9198-1f36-41c7-a6ee-1d2fec0a0b1a/downloadef9180555c288b78cd79594a02c5b5efMD53LICENSElicense.txtlicense.txttext/plain; charset=utf-82000https://repositorio.unbosque.edu.co/bitstreams/3b8a8146-f1d5-4cea-8b18-9d6f7a976995/download17cc15b951e7cc6b3728a574117320f9MD55Carta de autorizacion.pdfapplication/pdf374302https://repositorio.unbosque.edu.co/bitstreams/84163354-8efb-45e2-ae24-be17e2194325/download41df5fe15be04ba62f37c27541d997f4MD57Anexo 1 acta de aprobacion.pdfapplication/pdf229023https://repositorio.unbosque.edu.co/bitstreams/ac3b8143-2766-4738-a507-35743dc3b3e5/download1c31826817714db232e96c96c32613a0MD58CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8899https://repositorio.unbosque.edu.co/bitstreams/30f81af5-6778-4511-90b3-966db31b5f77/download3b6ce8e9e36c89875e8cf39962fe8920MD56TEXTTrabajo de grado.pdf.txtTrabajo de grado.pdf.txtExtracted texttext/plain89672https://repositorio.unbosque.edu.co/bitstreams/51e1d83c-3d1f-4db7-b4be-58e5cfa10cc5/downloadc6ad87fef7eecc23b5b49efbd115682dMD59Anexos 2.pdf.txtAnexos 2.pdf.txtExtracted texttext/plain2112https://repositorio.unbosque.edu.co/bitstreams/41144146-c91d-4d5b-a84e-3db877f981df/downloadd93c12127ff1a29be3d94b5e5925d23fMD511THUMBNAILTrabajo de grado.pdf.jpgTrabajo de grado.pdf.jpgGenerated Thumbnailimage/jpeg3759https://repositorio.unbosque.edu.co/bitstreams/d8caa2a7-31b8-41d0-b426-537020a1c0ba/download0a4b3684fa26afc41ee57e355a130db9MD510Anexos 2.pdf.jpgAnexos 2.pdf.jpgGenerated Thumbnailimage/jpeg2914https://repositorio.unbosque.edu.co/bitstreams/593524b5-138b-4fb8-bde3-02f905dd9bb8/downloaddcebecfa5e9ee335bf0b36c719cc43c1MD51220.500.12495/14596oai:repositorio.unbosque.edu.co:20.500.12495/145962025-06-10 05:08:46.843restrictedhttps://repositorio.unbosque.edu.coRepositorio Institucional Universidad El Bosquebibliotecas@biteca.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 |