Secure e-Learning Framework (SeLF)

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 340)


While providing several benefits of e-Learning, different organizers and the technology group are facing several challenges like configuration, security issues and standard framework etc. Researchers are also discussing many ways regarding security implementation issues or secured framework for e-Learning system. Considering Object Oriented Approach (OOA), Digital Right Management (DRM) and access control, Cryptographic Security Algorithm (CSA), we have provided an idea for designing the Secure e-Learning Framework (SeLF), which will be encouraging to implement for the next generation of learning system.


e-Learning OOA DRM CSA SeLF 


  1. 1.
    Barik, N., Karforma, S.: Risks and remedies in e-learning system. Int. J. Network Secur. Its Appl. (IJNSA), 4(1) 2012. ISSN: 0974–9330(OL), 0975–2307(P), pp. 51–59Google Scholar
  2. 2.
    Barik, N., Barik A., Karforma S.: On security management in E-learning system. International Conference on Intelligent Infrastructure on December 1–2, Science City, Kolkata (2012)Google Scholar
  3. 3.
    Barik, N., Karforma, S.: Digital right management in e-learning security. Int. J. Adv. Res. Comput. Sci. Soft. Eng. (IJARCSSE) 4(4) (2014). ISSN 2277-128XGoogle Scholar
  4. 4.
    Barik, N., Karforma, S.: Utilization of multimedia database with secure registration in e-learning system. In: 4th Annual International Conference on Education and e-Learning (EeL2014), pp. 110–114. Bangkok, 25–26 Aug 2014Google Scholar
  5. 5.
    Weippl, E.R.: IT security context in E-learning, 10 Sept 2008Google Scholar
  6. 6.
    Weippl, E.R.: Security in E-Learning. Springer, Berlin (2005)Google Scholar
  7. 7.
    Sathiaseelan, J.G.R., Albert Rabara, S.: Secure framework for composite web services. In: Proceedings of 2010 2nd International Conference on Information and Multimedia Technology (ICIMT 2010), pp. 141–145. IEEE Press, ISBN: 978-1-4244-8882-7, Hong Kong (2010)Google Scholar
  8. 8.
    Barik, N.: Security issues related to E-assessment: a UML based approach. Int. J. Adv. Res. Comput. Sci. (IJARCS) 3(3) (2012). ISSN: 0976-5697Google Scholar
  9. 9.
    Barik, N., Karforma, S.: Object oriented modelling of secured E-assessment system. Int. J. Sci. Eng. Res. (IJSER) 3(8) (2012) ISSN 2229-5518Google Scholar
  10. 10.
    Barik, N., Karforma, S. et al.: Towards design and implementation of space efficient and secured transmission scheme on E-Governance data, pp. 80–85. ICCS, Burdwan University, 19–20 Nov 2010Google Scholar
  11. 11.
    Barik, N., Karforma, S.: A study on efficient digital signature scheme for E-governance security. Global J. Comput. Sci. Technol. (GJCST) XII(II) Version-I. ISSN: 0975-4172(OL) & 0975-4350(P) (2012) pp. 7–11Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Vidyasagar UniversityMidnaporeIndia
  2. 2.Burdwan UniversityBurdwanIndia

Personalised recommendations