CS 533

Database Management Systems (Fall 2023)

Course Goals

The objective is to understand the theoretical underpinnings as well as the implementation techniques of the different components of a Database System, with special emphasis on Distributed Databases. The course will also touch upon Database Security and Privacy.

Announcements

Welcome to CS 533!

Location and Time

All the lectures are in-person and online on Tuesday and Thursday from 3:30 PM - 4:45 PM at CSB-425. Zoom link is posted on the Canvas website.

Pre-requisites

Previous enrollment in CS 430 or Permission of the Instructor.

Recommended Books

Database Management Systems (Third Edition) by R. Ramakrishnan and J. Gehrke, published by McGraw-Hill.

Concurrency Control and Recovery in Database Systems by P.A. Bernstein, V. Hadzilacos and N. Goodman, published by Addison-Wesley, 1987.

Principles of Distributed Database Systems by M. Tamer Ozsu and P. Valduriez, Fourth Edition, published by Springer, 2019.

Topics to be Covered

Topic Reading
Introduction Notes
Review of Query Processing (Ram. Ch. 12,14,15)
Review of Centralized Concurrency Control (Bern Ch.2,3,4,5)
Review of Centralized Recovery (Bern. Ch.6)
Distributed Query Processing (Ozsu Ch.1, 4)
Distributed Concurrency Control (Ozsu Ch. 5)
Distributed Recovery (Ozsu Ch. 5)
Replicated Databases (Bern. Ch. 8, Ozsu Ch.6) & Papers
Access Control in Databases Papers
Database Privacy Papers
Graph Databases Papers
Database Integration (Ozsu Ch. 7)

Grading Policy

Type Weightage
Term Paper/Project 40%
Term Paper Presentation 20%
Examination 30%
Class Participation 10%
Mark Range Grade Range
70 - 79 C
80 - 89 B
90 + A

A publishable quality term paper automatically gets you an A in the course.

There is no late policy. Your project/term paper is due before class on the due date. The due date may be extended only under exceptional circumstances.

Term Paper

A student can work on any topic of his/her choice but it must be approved by the instructor. Some suggestions:

Each student has to prepare a 15 minute presentation to the class describing his/her work. This includes time for questioning.

Here are some publicatiosn from the term papers:

  • Indrakshi Ray and Tai Xin, Concurrent and Real-Time Update of Access Control Policies, Proceedings of the 14th International Conference on Database and Expert Systems, Prague, Czech Republic, September 2003. [pdf]

  • Indrakshi Ray, Ross M. McConnell, Monte Lunacek, and Vijay Kumar, Reducing Damage Assessment Latency in Survivable Databases, Proceedings of the 21st British National Conference on Databases, Edinburgh, Scotland, July 2004. [pdf]

  • Indrakshi Ray, Tai Xin and Yajie Zhu, Ensuring Task Dependencies During Workflow Recovery, Proceedings of he 15th International Conference on Database and Expert Systems, Zaragoza, Spain, August 2004. [pdf]

  • Indrakshi Ray and Mariana Muller, Using Schemas to Simplify Access Control for XML Documents, Proceedings of the International Conference on Distributed Computing and Internet Technologies, Bhubaneswar, India, December 2004. [pdf]

  • Shuxin Yin and Indrakshi Ray, Relational Database Operations Modeling with UML, Proceedings of the 19th International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, March 2005.[pdf]

  • Indrakshi Ray and Lijun Yu Short Paper: Towards a Location-Aware Role-Based Access Control Model, Proceedings of the 1st IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks, Athens, Greece, September 2005.[pdf]

  • Indrakshi Ray and Wei Huang, Event Detection in Multi-level Secure Databases, Proceedings of the 1st International Conference on Secure Systems, Kolkata, India, December 2005.[pdf]

  • Jinyoo Kim, Yashwant K. Malaiya and Indrakshi Ray, Vulnerability Discovery in Multi-Version Software Systems, Proceedings of the 10th IEEE High Assurance Systems Engineering Symposium, Dallas, Texas, November 2007.[pdf]

  • Xing Xie, Indrakshi Ray, Waruna Ranasinghe, Philips A. Gilbert, Pramod Shashidhara, Anoop Yadav, Distributed Multilevel Secure Data Stream Processing, Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems Workshops, Philadelphia, Pennsylvania, July 2013. [pdf]

  • Prabhakaran Murugesan, Indrakshi Ray, Audit Log Management in MongoDB, Proceedings of the IEEE World Congress on Services, Anchorage, Alaska, June 2014.[pdf]

  • Andy Chunliang Hsu, Indrakshi Ray, Specification and Enforcement of Location-Aware Attribute-Based Access Control for Online Social Networks, Proceedings of the ACM International Workshop on Attribute Based Access Control, New Orleans, Louisiana, arch 2016.[pdf]

  • Subhojeet Mukherjee, Noah Cain, Jacob Walker, David White, Indrajit Ray, Indrakshi Ray, POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, October 2017.[pdf]

  • Katherine Haynes, Hossein Shirazi, Indrakshi Ray, Lightweight URL-Based Phishing Detection using Natural Language Processing Transformers for Mobile Devices, Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing, Leuven, Belgium, August 2021.[pdf]

Contact

Instructor Teaching Assistant
Dr.Indrakshi Ray Shadaab Kawnain Bashir
Office Hours: By appointment only Office Hours: By appointment only
Email: iray[at]cs.colostate.edu Email: shadaab[at]colostate.edu