Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT

Este informe presenta los avances de un proyecto de investigación enfocado en proteger la propiedad intelectual del código fuente de los trabajos de grado de estudiantes de Ingeniería de Sistemas de la Universidad El Bosque. El proyecto propone el uso de tecnología Blockchain y Tokens No Fungibles (...

Full description

Autores:
Morillo Ledezma, Génesis Gabriela
Ruiz Roa, Miguel Angel
Tipo de recurso:
https://purl.org/coar/resource_type/c_7a1f
Fecha de publicación:
2025
Institución:
Universidad El Bosque
Repositorio:
Repositorio U. El Bosque
Idioma:
spa
OAI Identifier:
oai:repositorio.unbosque.edu.co:20.500.12495/14596
Acceso en línea:
https://hdl.handle.net/20.500.12495/14596
Palabra clave:
Blockchain
Protección de datos
Certificados digitales
Tokens no fungibles (NFTs)
Código fuente
621.3
Blockchain
Data protection
Digital certificates
Non-fungible tokens (NFTs)
Source code
Rights
closedAccess
License
Acceso cerrado
id UNBOSQUE2_d3c6176a9ae957f9318d9265b5e42571
oai_identifier_str oai:repositorio.unbosque.edu.co:20.500.12495/14596
network_acronym_str UNBOSQUE2
network_name_str Repositorio U. El Bosque
repository_id_str
dc.title.none.fl_str_mv Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT
dc.title.translated.none.fl_str_mv Securing the source code of graduate work using non-fungible token technology-NFT
title Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT
spellingShingle Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT
Blockchain
Protección de datos
Certificados digitales
Tokens no fungibles (NFTs)
Código fuente
621.3
Blockchain
Data protection
Digital certificates
Non-fungible tokens (NFTs)
Source code
title_short Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT
title_full Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT
title_fullStr Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT
title_full_unstemmed Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT
title_sort Asegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFT
dc.creator.fl_str_mv Morillo Ledezma, Génesis Gabriela
Ruiz Roa, Miguel Angel
dc.contributor.advisor.none.fl_str_mv Ramírez López, Leonardo Juan
dc.contributor.author.none.fl_str_mv Morillo Ledezma, Génesis Gabriela
Ruiz Roa, Miguel Angel
dc.subject.none.fl_str_mv Blockchain
Protección de datos
Certificados digitales
Tokens no fungibles (NFTs)
Código fuente
topic Blockchain
Protección de datos
Certificados digitales
Tokens no fungibles (NFTs)
Código fuente
621.3
Blockchain
Data protection
Digital certificates
Non-fungible tokens (NFTs)
Source code
dc.subject.ddc.none.fl_str_mv 621.3
dc.subject.keywords.none.fl_str_mv Blockchain
Data protection
Digital certificates
Non-fungible tokens (NFTs)
Source code
description Este informe presenta los avances de un proyecto de investigación enfocado en proteger la propiedad intelectual del código fuente de los trabajos de grado de estudiantes de Ingeniería de Sistemas de la Universidad El Bosque. El proyecto propone el uso de tecnología Blockchain y Tokens No Fungibles (NFTs) para crear certificados digitales que garanticen la autenticidad e integridad del software entregado por los estudiantes. Se estructura bajo la metodología Scrum y se enmarca en el macroproyecto TestBed-UB. El sistema desarrollado se basa en una arquitectura Blockchain multichain, que permite registrar, verificar y certificar digitalmente los códigos fuente. Se detallan los requerimientos funcionales (como autenticación, gestión de usuarios, emisión y verificación de certificados NFT) y no funcionales (seguridad, escalabilidad, usabilidad). Además, se aplica el Modelo Biopsicosocial y Cultural (MBPSC) para analizar el impacto de la solución en los actores involucrados (estudiantes, comité de grado y grupo de investigación). A la fecha, se han desarrollado la arquitectura, interfaz de usuario, y contratos inteligentes. Resta completar las pruebas, validación y despliegue final. Se concluye que la solución basada en Blockchain y NFTs ofrece una protección robusta frente a plagio y acceso no autorizado, fortaleciendo la confianza en el proceso académico. El proyecto propone la redacción de un artículo final de resultados para su publicación académica.
publishDate 2025
dc.date.accessioned.none.fl_str_mv 2025-06-09T15:03:19Z
dc.date.available.none.fl_str_mv 2025-06-09T15:03:19Z
dc.date.issued.none.fl_str_mv 2025-05
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_7a1f
dc.type.local.spa.fl_str_mv Tesis/Trabajo de grado - Monografía - Pregrado
dc.type.coar.none.fl_str_mv https://purl.org/coar/resource_type/c_7a1f
dc.type.driver.none.fl_str_mv info:eu-repo/semantics/bachelorThesis
dc.type.coarversion.none.fl_str_mv https://purl.org/coar/version/c_ab4af688f83e57aa
format https://purl.org/coar/resource_type/c_7a1f
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.12495/14596
dc.identifier.instname.spa.fl_str_mv instname:Universidad El Bosque
dc.identifier.reponame.spa.fl_str_mv reponame:Repositorio Institucional Universidad El Bosque
dc.identifier.repourl.none.fl_str_mv repourl:https://repositorio.unbosque.edu.co
url https://hdl.handle.net/20.500.12495/14596
identifier_str_mv instname:Universidad El Bosque
reponame:Repositorio Institucional Universidad El Bosque
repourl:https://repositorio.unbosque.edu.co
dc.language.iso.fl_str_mv spa
language spa
dc.relation.references.none.fl_str_mv [1]Md. M. Islam and H. P. In, “Decentralized Global Copyright System Based on Consortium Blockchain With Proof of Authority,” IEEE Access, vol. 11, pp. 43101–43115, 2023, doi: 10.1109/ACCESS.2023.3270627.
[2]X. Wen, “Application of blockchain technology in copyright protection of digital music information,” International Journal of Grid and Utility Computing, vol. 14, no. 2/3, p. 136, 2023, doi: 10.1504/IJGUC.2023.131015.
[3]V. Tanwar and K. R. Ramkumar, “An Analysis of Blockchain and NFT Technologies and their Drawbacks,” in 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC), IEEE, May 2023, pp. 1251–1259. doi: 10.1109/ICAAIC56838.2023.10140828.
[4]P. J. Taylor, T. Dargahi, A. Dehghantanha, R. M. Parizi, and K.-K. R. Choo, “A systematic literature review of blockchain cyber security,” Digital Communications and Networks, vol. 6, no. 2, pp. 147–156, May 2020, doi: 10.1016/j.dcan.2019.01.005.
[5]H. Xu, W. Liu, and X. Liu, “Blockchain-Based Trust Auction for Dynamic Virtual Machine Provisioning and Allocation in Clouds,” Wireless Communications and Mobile Computing, vol. 2021, pp. 1–10, Jun. 2021, doi: 10.1155/2021/6639107.
[6]A. Mishra, S. Karmakar, A. Dutta, A. Bose, and M. Mohapatro, “Design and Deployment of IoT enabled Blockchain based resilient Supply-chain Management System using Ethereum,” International Journal of Computing and Digital Systems, vol. 12, no. 4, pp. 1029–1050, Oct. 2022, doi: 10.12785/ijcds/120183.
[7]R. Zhang, R. Xue, and L. Liu, “Security and Privacy on Blockchain,” ACM Computing Surveys, vol. 52, no. 3, pp. 1–34, May 2020, doi: 10.1145/3316481.
[8]H. Guo and X. Yu, “A survey on blockchain technology and its security,” Blockchain: Research and Applications, vol. 3, no. 2, p. 100067, Jun. 2022, doi: 10.1016/j.bcra.2022.100067.
[9]N. Jing, Q. Liu, and V. Sugumaran, “A blockchain-based code copyright management system,” Information Processing Management, vol. 58, no. 3, p. 102518, May 2021, doi: 10.1016/j.ipm.2021.102518.
[10]F. Ullah and F. Al-Turjman, “A conceptual framework for blockchain smart contract adoption to manage real estate deals in smart cities,” Neural Computing and Applications, vol. 35, no. 7, pp. 5033–5054, Mar. 2023, doi: 10.1007/s00521-021-05800-6.
[11]H. Han, R. K. Shiwakoti, R. Jarvis, C. Mordi, and D. Botchie, “Accounting and auditing with blockchain technology and artificial Intelligence: A literature review,” International Journal of Accounting Information Systems, vol. 48, p. 100598, Mar. 2023, doi: 10.1016/j.accinf.2022.100598.
[12]R. A. Koussema and H. Haga, “Highly Secure Residents Life Event Mana- gement System Based on Blockchain by Hyperledger Fabric,” Journal of Computer and Communications, vol. 09, no. 09, 2021, doi: 10.4236/jcc.2021.99003.
[13]J. Panduro-Ramirez, M. Lourens, A. Gehlot, D. P. Singh, Y. Singh, and D.J. Salunke, “Blockchain Approach for Implementing Access Control In IOT,” in 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), IEEE, Jan. 2023, pp. 596–599. doi: 10.1109/AISC56616.2023.10085452.
[14]S. Wang et al., “Blockchain Smart Contract Virtual Machine Optimization Technology for Domain Name Systems,” in 2021 IEEE International Conference on Industrial Application of Artificial Intelligence (IAAI), IEEE, Dec. 2021, pp. 445–451. doi: 10.1109/IAAI54625.2021.9699960.
[15]J. Arcenegui, R. Arjona, and I. Baturone, “Secure Management of IoT Devices Based on Blockchain Non-fungible Tokens and Physical Unclonable Functions,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12418 LNCS, 2020, pp. 24–40. doi: 10.1007/978-3-030-61638-02.
[16]S. Karagwal, S. Tanwar, S. Badotra, A. Rana, and V. Jain, “Blockchain for Internet of Things (IoT): Research Issues, Challenges, and Future Directions,” in EAI/Springer Innovations in Communication and Computing, 2023, pp. 15–34. doi: 10.1007/978-3-031-04524-02.
[17]N. Kumar, V. Goel, R. Ranjan, M. Altuwairiqi, H. Alyami, and S. A. Asakipaam, “A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City,” Security and Com- munication Networks, vol. 2023, pp. 1–13, Apr. 2023, doi: 10.1155/2023/8168075.
[18]D. L. Fekete and A. Kiss, “Toward Building Smart Contract-Based Higher Education Systems Using Zero-Knowledge Ethereum Virtual Machine,” Electro- nics (Switzerland), vol. 12, no. 3, 2023, doi: 10.3390/electronics12030664.
[19]M. Zichichi, G. D’Angelo, S. Ferretti, and M. Marzolla, “Accountable Clouds Through Blockchain,” IEEE Access, vol. 11, pp. 48358–48374, 2023, doi: 10.1109/ACCESS.2023.3276240.
[20]K. Ko, T. Jeong, J. Woo, and J. W. Hong, “Survey on blockchain‐based non‐fungible tokens: History, technologies, standards, and open challenges,” International Journal of Network Management, vol. 34, no. 1, Jan. 2024, doi: 10.1002/nem.2245.
[21]C. G. Kim, “A Study on Technology to Counter Copyright Infringement According to NFT Transaction Types,” Journal of the Semiconductor Display Technology, vol. 20, no. 4, 2021.
[22]R. Qin, J. Li, X. Wang, J. Zhu, Y. Yuan, and F. Y. Wang, “NFT: blockchain- based non-fungible token and applications,” Chinese Journal of Intelligent Science and Technology, vol. 3, no. 2, 2021, doi: 10.11959/j.issn.2096-6652.202125.
[23] E. Borandag, “A Blockchain-Based Recycling Platform Using Image Processing, QR Codes, and IoT System,” Sustainability (Switzerland), vol. 15, no. 7, 2023, doi: 10.3390/su15076116.
[24] R. Kräussl and A. Tugnetti, “Non-Fungible Tokens (NFTs): A Review of Pricing Determinants, Applications and Opportunities,” Journal of Economic Surveys, vol. 38, no. 2, 2024, doi: 10.1111/joes.12597.
[25] R. Kräussl and A. Tugnetti, “Non-Fungible Tokens (NFTs): A Review of Pricing Determinants, Applications and Opportunities,” Journal of Economic Surveys, vol. 38, no. 2, 2024, doi: 10.1111/joes.12597.
[26] S. Zhao, Z. Zeng, J. Peng, and F. Yu, “Achieving a Secure and Traceable High-Definition Multimedia Data Trading Scheme Based on Blockchain,” Mathematics, vol. 11, no. 10, 2023, doi: 10.3390/math11102224.
[27] E. Borandag, “A Blockchain-Based Recycling Platform Using Image Processing, QR Codes, and IoT System,” Sustainability (Switzerland), vol. 15, no. 7, 2023, doi: 10.3390/su15076116.
[28]J. Bellagarda and A. M. Abu-Mahfouz, “Connect2NFT: A Web-Based, Blockchain Enabled NFT Application with the Aim of Reducing Fraud and En- suring Authenticated Social, Non-Human Verified Digital Identity,” Mathematics, vol. 10, no. 21, p. 3934, Oct. 2022, doi: 10.3390/math10213934.
[29]H. Taherdoost, “Non-Fungible Tokens (NFT): A Systematic Review,” In- formation (Switzerland), vol. 14, no. 1. 2023. doi: 10.3390/info14010026.
[30]M. K. Hari, A. Agrawal, R. Bhatia, A. Bhatia, and K. Tiwari, “T-PASS: A Blockchain-based NFT Enabled Property Management and Exchange System,” in 2023 International Conference on Information Networking (ICOIN), IEEE, Jan. 2023, pp. 140–145. doi: 10.1109/ICOIN56518.2023.10048973.
[31]C. Chen, H. Huang, B. Zhao, D. Shu, and Y. Wang, “The Research of AHP- Based Credit Rating System on a Blockchain Application,” Electronics (Switzer- land), vol. 12, no. 4, 2023, doi: 10.3390/electronics12040887.
dc.rights.local.spa.fl_str_mv Acceso cerrado
dc.rights.accessrights.none.fl_str_mv info:eu-repo/semantics/closedAccess
http://purl.org/coar/access_right/c_14cb
rights_invalid_str_mv Acceso cerrado
http://purl.org/coar/access_right/c_14cb
eu_rights_str_mv closedAccess
dc.format.mimetype.none.fl_str_mv application/pdf
dc.publisher.program.spa.fl_str_mv Ingeniería de Sistemas
dc.publisher.grantor.spa.fl_str_mv Universidad El Bosque
dc.publisher.faculty.spa.fl_str_mv Facultad de Ingeniería
institution Universidad El Bosque
bitstream.url.fl_str_mv https://repositorio.unbosque.edu.co/bitstreams/d58b87db-1882-4002-9e8d-356e3fc14b7c/download
https://repositorio.unbosque.edu.co/bitstreams/d77e9198-1f36-41c7-a6ee-1d2fec0a0b1a/download
https://repositorio.unbosque.edu.co/bitstreams/3b8a8146-f1d5-4cea-8b18-9d6f7a976995/download
https://repositorio.unbosque.edu.co/bitstreams/84163354-8efb-45e2-ae24-be17e2194325/download
https://repositorio.unbosque.edu.co/bitstreams/ac3b8143-2766-4738-a507-35743dc3b3e5/download
https://repositorio.unbosque.edu.co/bitstreams/30f81af5-6778-4511-90b3-966db31b5f77/download
https://repositorio.unbosque.edu.co/bitstreams/51e1d83c-3d1f-4db7-b4be-58e5cfa10cc5/download
https://repositorio.unbosque.edu.co/bitstreams/41144146-c91d-4d5b-a84e-3db877f981df/download
https://repositorio.unbosque.edu.co/bitstreams/d8caa2a7-31b8-41d0-b426-537020a1c0ba/download
https://repositorio.unbosque.edu.co/bitstreams/593524b5-138b-4fb8-bde3-02f905dd9bb8/download
bitstream.checksum.fl_str_mv 5c46c60023f09bee4ed371819a3ce82e
ef9180555c288b78cd79594a02c5b5ef
17cc15b951e7cc6b3728a574117320f9
41df5fe15be04ba62f37c27541d997f4
1c31826817714db232e96c96c32613a0
3b6ce8e9e36c89875e8cf39962fe8920
c6ad87fef7eecc23b5b49efbd115682d
d93c12127ff1a29be3d94b5e5925d23f
0a4b3684fa26afc41ee57e355a130db9
dcebecfa5e9ee335bf0b36c719cc43c1
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional Universidad El Bosque
repository.mail.fl_str_mv bibliotecas@biteca.com
_version_ 1836752266459086848
spelling Ramírez López, Leonardo JuanMorillo Ledezma, Génesis GabrielaRuiz Roa, Miguel Angel2025-06-09T15:03:19Z2025-06-09T15:03:19Z2025-05https://hdl.handle.net/20.500.12495/14596instname:Universidad El Bosquereponame:Repositorio Institucional Universidad El Bosquerepourl:https://repositorio.unbosque.edu.coEste informe presenta los avances de un proyecto de investigación enfocado en proteger la propiedad intelectual del código fuente de los trabajos de grado de estudiantes de Ingeniería de Sistemas de la Universidad El Bosque. El proyecto propone el uso de tecnología Blockchain y Tokens No Fungibles (NFTs) para crear certificados digitales que garanticen la autenticidad e integridad del software entregado por los estudiantes. Se estructura bajo la metodología Scrum y se enmarca en el macroproyecto TestBed-UB. El sistema desarrollado se basa en una arquitectura Blockchain multichain, que permite registrar, verificar y certificar digitalmente los códigos fuente. Se detallan los requerimientos funcionales (como autenticación, gestión de usuarios, emisión y verificación de certificados NFT) y no funcionales (seguridad, escalabilidad, usabilidad). Además, se aplica el Modelo Biopsicosocial y Cultural (MBPSC) para analizar el impacto de la solución en los actores involucrados (estudiantes, comité de grado y grupo de investigación). A la fecha, se han desarrollado la arquitectura, interfaz de usuario, y contratos inteligentes. Resta completar las pruebas, validación y despliegue final. Se concluye que la solución basada en Blockchain y NFTs ofrece una protección robusta frente a plagio y acceso no autorizado, fortaleciendo la confianza en el proceso académico. El proyecto propone la redacción de un artículo final de resultados para su publicación académica.Grupo deinvestigaicón OSIRIS & BIOAXISIngeniero de SistemasPregradoThis report presents the progress of a research project focused on protecting the intellectual property of source code submitted by Systems Engineering students at Universidad El Bosque. The project employs Blockchain technology and Non-Fungible Tokens (NFTs) to create digital certificates that ensure the authenticity and integrity of the submitted software. The initiative is part of the TestBed-UB macroproject and follows the Scrum methodology. The system is based on a multichain Blockchain architecture, enabling the secure registration, verification, and certification of source code. Functional requirements (such as authentication, user management, and NFT-based certificate generation and validation) and non-functional requirements (including security, scalability, and usability) are thoroughly defined. The Biopsychosocial and Cultural Model (MBPSC) is used to assess the solution’s impact on key stakeholders (students, thesis committee, and research group). To date, the architecture, user interface, and smart contracts have been developed, with testing, validation, and final deployment still pending. The findings confirm that a Blockchain and NFT-based system provides a robust mechanism against plagiarism and unauthorized access, enhancing trust in the academic process. The next steps include writing and submitting a final research article to an academic journal.application/pdfBlockchainProtección de datosCertificados digitalesTokens no fungibles (NFTs)Código fuente621.3BlockchainData protectionDigital certificatesNon-fungible tokens (NFTs)Source codeAsegurando el código fuente de los trabajos de grado mediante la tecnología de tokens no fungibles-NFTSecuring the source code of graduate work using non-fungible token technology-NFTIngeniería de SistemasUniversidad El BosqueFacultad de IngenieríaTesis/Trabajo de grado - Monografía - Pregradohttps://purl.org/coar/resource_type/c_7a1fhttp://purl.org/coar/resource_type/c_7a1finfo:eu-repo/semantics/bachelorThesishttps://purl.org/coar/version/c_ab4af688f83e57aa[1]Md. M. Islam and H. P. In, “Decentralized Global Copyright System Based on Consortium Blockchain With Proof of Authority,” IEEE Access, vol. 11, pp. 43101–43115, 2023, doi: 10.1109/ACCESS.2023.3270627.[2]X. Wen, “Application of blockchain technology in copyright protection of digital music information,” International Journal of Grid and Utility Computing, vol. 14, no. 2/3, p. 136, 2023, doi: 10.1504/IJGUC.2023.131015.[3]V. Tanwar and K. R. Ramkumar, “An Analysis of Blockchain and NFT Technologies and their Drawbacks,” in 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC), IEEE, May 2023, pp. 1251–1259. doi: 10.1109/ICAAIC56838.2023.10140828.[4]P. J. Taylor, T. Dargahi, A. Dehghantanha, R. M. Parizi, and K.-K. R. Choo, “A systematic literature review of blockchain cyber security,” Digital Communications and Networks, vol. 6, no. 2, pp. 147–156, May 2020, doi: 10.1016/j.dcan.2019.01.005.[5]H. Xu, W. Liu, and X. Liu, “Blockchain-Based Trust Auction for Dynamic Virtual Machine Provisioning and Allocation in Clouds,” Wireless Communications and Mobile Computing, vol. 2021, pp. 1–10, Jun. 2021, doi: 10.1155/2021/6639107.[6]A. Mishra, S. Karmakar, A. Dutta, A. Bose, and M. Mohapatro, “Design and Deployment of IoT enabled Blockchain based resilient Supply-chain Management System using Ethereum,” International Journal of Computing and Digital Systems, vol. 12, no. 4, pp. 1029–1050, Oct. 2022, doi: 10.12785/ijcds/120183.[7]R. Zhang, R. Xue, and L. Liu, “Security and Privacy on Blockchain,” ACM Computing Surveys, vol. 52, no. 3, pp. 1–34, May 2020, doi: 10.1145/3316481.[8]H. Guo and X. Yu, “A survey on blockchain technology and its security,” Blockchain: Research and Applications, vol. 3, no. 2, p. 100067, Jun. 2022, doi: 10.1016/j.bcra.2022.100067.[9]N. Jing, Q. Liu, and V. Sugumaran, “A blockchain-based code copyright management system,” Information Processing Management, vol. 58, no. 3, p. 102518, May 2021, doi: 10.1016/j.ipm.2021.102518.[10]F. Ullah and F. Al-Turjman, “A conceptual framework for blockchain smart contract adoption to manage real estate deals in smart cities,” Neural Computing and Applications, vol. 35, no. 7, pp. 5033–5054, Mar. 2023, doi: 10.1007/s00521-021-05800-6.[11]H. Han, R. K. Shiwakoti, R. Jarvis, C. Mordi, and D. Botchie, “Accounting and auditing with blockchain technology and artificial Intelligence: A literature review,” International Journal of Accounting Information Systems, vol. 48, p. 100598, Mar. 2023, doi: 10.1016/j.accinf.2022.100598.[12]R. A. Koussema and H. Haga, “Highly Secure Residents Life Event Mana- gement System Based on Blockchain by Hyperledger Fabric,” Journal of Computer and Communications, vol. 09, no. 09, 2021, doi: 10.4236/jcc.2021.99003.[13]J. Panduro-Ramirez, M. Lourens, A. Gehlot, D. P. Singh, Y. Singh, and D.J. Salunke, “Blockchain Approach for Implementing Access Control In IOT,” in 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), IEEE, Jan. 2023, pp. 596–599. doi: 10.1109/AISC56616.2023.10085452.[14]S. Wang et al., “Blockchain Smart Contract Virtual Machine Optimization Technology for Domain Name Systems,” in 2021 IEEE International Conference on Industrial Application of Artificial Intelligence (IAAI), IEEE, Dec. 2021, pp. 445–451. doi: 10.1109/IAAI54625.2021.9699960.[15]J. Arcenegui, R. Arjona, and I. Baturone, “Secure Management of IoT Devices Based on Blockchain Non-fungible Tokens and Physical Unclonable Functions,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12418 LNCS, 2020, pp. 24–40. doi: 10.1007/978-3-030-61638-02.[16]S. Karagwal, S. Tanwar, S. Badotra, A. Rana, and V. Jain, “Blockchain for Internet of Things (IoT): Research Issues, Challenges, and Future Directions,” in EAI/Springer Innovations in Communication and Computing, 2023, pp. 15–34. doi: 10.1007/978-3-031-04524-02.[17]N. Kumar, V. Goel, R. Ranjan, M. Altuwairiqi, H. Alyami, and S. A. Asakipaam, “A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City,” Security and Com- munication Networks, vol. 2023, pp. 1–13, Apr. 2023, doi: 10.1155/2023/8168075.[18]D. L. Fekete and A. Kiss, “Toward Building Smart Contract-Based Higher Education Systems Using Zero-Knowledge Ethereum Virtual Machine,” Electro- nics (Switzerland), vol. 12, no. 3, 2023, doi: 10.3390/electronics12030664.[19]M. Zichichi, G. D’Angelo, S. Ferretti, and M. Marzolla, “Accountable Clouds Through Blockchain,” IEEE Access, vol. 11, pp. 48358–48374, 2023, doi: 10.1109/ACCESS.2023.3276240.[20]K. Ko, T. Jeong, J. Woo, and J. W. Hong, “Survey on blockchain‐based non‐fungible tokens: History, technologies, standards, and open challenges,” International Journal of Network Management, vol. 34, no. 1, Jan. 2024, doi: 10.1002/nem.2245.[21]C. G. Kim, “A Study on Technology to Counter Copyright Infringement According to NFT Transaction Types,” Journal of the Semiconductor Display Technology, vol. 20, no. 4, 2021.[22]R. Qin, J. Li, X. Wang, J. Zhu, Y. Yuan, and F. Y. Wang, “NFT: blockchain- based non-fungible token and applications,” Chinese Journal of Intelligent Science and Technology, vol. 3, no. 2, 2021, doi: 10.11959/j.issn.2096-6652.202125.[23] E. Borandag, “A Blockchain-Based Recycling Platform Using Image Processing, QR Codes, and IoT System,” Sustainability (Switzerland), vol. 15, no. 7, 2023, doi: 10.3390/su15076116.[24] R. Kräussl and A. Tugnetti, “Non-Fungible Tokens (NFTs): A Review of Pricing Determinants, Applications and Opportunities,” Journal of Economic Surveys, vol. 38, no. 2, 2024, doi: 10.1111/joes.12597.[25] R. Kräussl and A. Tugnetti, “Non-Fungible Tokens (NFTs): A Review of Pricing Determinants, Applications and Opportunities,” Journal of Economic Surveys, vol. 38, no. 2, 2024, doi: 10.1111/joes.12597.[26] S. Zhao, Z. Zeng, J. Peng, and F. Yu, “Achieving a Secure and Traceable High-Definition Multimedia Data Trading Scheme Based on Blockchain,” Mathematics, vol. 11, no. 10, 2023, doi: 10.3390/math11102224.[27] E. Borandag, “A Blockchain-Based Recycling Platform Using Image Processing, QR Codes, and IoT System,” Sustainability (Switzerland), vol. 15, no. 7, 2023, doi: 10.3390/su15076116.[28]J. Bellagarda and A. M. Abu-Mahfouz, “Connect2NFT: A Web-Based, Blockchain Enabled NFT Application with the Aim of Reducing Fraud and En- suring Authenticated Social, Non-Human Verified Digital Identity,” Mathematics, vol. 10, no. 21, p. 3934, Oct. 2022, doi: 10.3390/math10213934.[29]H. Taherdoost, “Non-Fungible Tokens (NFT): A Systematic Review,” In- formation (Switzerland), vol. 14, no. 1. 2023. doi: 10.3390/info14010026.[30]M. K. Hari, A. Agrawal, R. Bhatia, A. Bhatia, and K. Tiwari, “T-PASS: A Blockchain-based NFT Enabled Property Management and Exchange System,” in 2023 International Conference on Information Networking (ICOIN), IEEE, Jan. 2023, pp. 140–145. doi: 10.1109/ICOIN56518.2023.10048973.[31]C. Chen, H. Huang, B. Zhao, D. Shu, and Y. Wang, “The Research of AHP- Based Credit Rating System on a Blockchain Application,” Electronics (Switzer- land), vol. 12, no. 4, 2023, doi: 10.3390/electronics12040887.Acceso cerradoinfo:eu-repo/semantics/closedAccesshttp://purl.org/coar/access_right/c_14cbspaORIGINALTrabajo de grado.pdfTrabajo de grado.pdfapplication/pdf2073466https://repositorio.unbosque.edu.co/bitstreams/d58b87db-1882-4002-9e8d-356e3fc14b7c/download5c46c60023f09bee4ed371819a3ce82eMD54Anexos 2.pdfAnexos 2.pdfapplication/pdf406126https://repositorio.unbosque.edu.co/bitstreams/d77e9198-1f36-41c7-a6ee-1d2fec0a0b1a/downloadef9180555c288b78cd79594a02c5b5efMD53LICENSElicense.txtlicense.txttext/plain; charset=utf-82000https://repositorio.unbosque.edu.co/bitstreams/3b8a8146-f1d5-4cea-8b18-9d6f7a976995/download17cc15b951e7cc6b3728a574117320f9MD55Carta de autorizacion.pdfapplication/pdf374302https://repositorio.unbosque.edu.co/bitstreams/84163354-8efb-45e2-ae24-be17e2194325/download41df5fe15be04ba62f37c27541d997f4MD57Anexo 1 acta de aprobacion.pdfapplication/pdf229023https://repositorio.unbosque.edu.co/bitstreams/ac3b8143-2766-4738-a507-35743dc3b3e5/download1c31826817714db232e96c96c32613a0MD58CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8899https://repositorio.unbosque.edu.co/bitstreams/30f81af5-6778-4511-90b3-966db31b5f77/download3b6ce8e9e36c89875e8cf39962fe8920MD56TEXTTrabajo de grado.pdf.txtTrabajo de grado.pdf.txtExtracted texttext/plain89672https://repositorio.unbosque.edu.co/bitstreams/51e1d83c-3d1f-4db7-b4be-58e5cfa10cc5/downloadc6ad87fef7eecc23b5b49efbd115682dMD59Anexos 2.pdf.txtAnexos 2.pdf.txtExtracted texttext/plain2112https://repositorio.unbosque.edu.co/bitstreams/41144146-c91d-4d5b-a84e-3db877f981df/downloadd93c12127ff1a29be3d94b5e5925d23fMD511THUMBNAILTrabajo de grado.pdf.jpgTrabajo de grado.pdf.jpgGenerated Thumbnailimage/jpeg3759https://repositorio.unbosque.edu.co/bitstreams/d8caa2a7-31b8-41d0-b426-537020a1c0ba/download0a4b3684fa26afc41ee57e355a130db9MD510Anexos 2.pdf.jpgAnexos 2.pdf.jpgGenerated Thumbnailimage/jpeg2914https://repositorio.unbosque.edu.co/bitstreams/593524b5-138b-4fb8-bde3-02f905dd9bb8/downloaddcebecfa5e9ee335bf0b36c719cc43c1MD51220.500.12495/14596oai:repositorio.unbosque.edu.co:20.500.12495/145962025-06-10 05:08:46.843restrictedhttps://repositorio.unbosque.edu.coRepositorio Institucional Universidad El Bosquebibliotecas@biteca.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