The objective is to understand the theoretical underpinnings as well as the implementation techniques of the different components of a Database System, with special emphasis on Distributed Databases. The course will also touch upon Database Security and Privacy.
All the lectures are online through zoom on Monday and Wednesday from 2:30 PM - 3:45 PM. Zoom link is posted on the Canvas website.
Previous enrollment in CS 430 or Permission of the Instructor.
Database Management Systems (Third Edition) by R. Ramakrishnan and J. Gehrke, published by McGraw-Hill.
Concurrency Control and Recovery in Database Systems by P.A. Bernstein, V. Hadzilacos and N. Goodman, published by Addison-Wesley, 1987.
Principles of Distributed Database Systems by M. Tamer Ozsu and P. Valduriez, Fourth Edition, published by Springer, 2019.
|Review of Query Processing||(Ram. Ch. 12,14,15)|
|Review of Centralized Concurrency Control||(Bern Ch.2,3,4,5)|
|Review of Centralized Recovery||(Bern. Ch.6)|
|Distributed Query Processing||(Ozsu Ch.1, 4)|
|Distributed Concurrency Control||(Ozsu Ch. 5)|
|Distributed Recovery||(Ozsu Ch. 5)|
|Replicated Databases||(Bern. Ch. 8, Ozsu Ch.6) & Papers|
|Access Control in Databases||Papers|
|Database Integration||(Ozsu Ch. 7)|
|Term Paper Presentation||20%|
|Mark Range||Grade Range|
|65 - 76||C- to C+|
|77 - 88||B- to B+|
|89 - 100||A- to A+|
A publishable quality term paper automatically gets you an A in the course.
There is no late policy. Your project/term paper is due before class on the due date. The due date may be extended only under exceptional circumstances.
Exams must be taken individually.
All parties involved in cheating will be prosecuted no matter who copied from whom.
Please be aware of the departmental cheating policy.
Each student has to prepare a 15 minute presentation to the class describing his/her work. This includes time for questioning.
Here are some publicatiosn from the term papers:
Indrakshi Ray and Tai Xin, Concurrent and Real-Time Update of Access Control Policies, Proceedings of the 14th International Conference on Database and Expert Systems, Prague, Czech Republic, September 2003
Indrakshi Ray, Ross M. McConnell, Monte Lunacek, and Vijay Kumar, Reducing Damage Assessment Latency in Survivable Databases, Proceedings of the 21st British National Conference on Databases, Edinburgh, Scotland, July 2004.
Indrakshi Ray, Tai Xin and Yajie Zhu, Ensuring Task Dependencies During Workflow Recovery, Proceedings of he 15th International Conference on Database and Expert Systems, Zaragoza, Spain, August 2004
Indrakshi Ray and Mariana Muller, Using Schemas to Simplify Access Control for XML Documents, Proceedings of the International Conference on Distributed Computing and Internet Technologies, Bhubaneswar, India, December 2004.
Shuxin Yin and Indrakshi Ray, Relational Database Operations Modeling with UML, Proceedings of the 19th International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, March 2005.
Indrakshi Ray and Lijun Yu Short Paper: Towards a Location-Aware Role-Based Access Control Model, Proceedings of the 1st IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks, Athens, Greece, September 2005.
Indrakshi Ray and Wei Huang, Event Detection in Multi-level Secure Databases, Proceedings of the 1st International Conference on Secure Systems, Kolkata, India, December 2005.
Jinyoo Kim, Yashwant K. Malaiya and Indrakshi Ray, Vulnerability Discovery in Multi-Version Software Systems, Proceedings of the 10th IEEE High Assurance Systems Engineering Symposium, Dallas, Texas, November 2007.
Xing Xie, Indrakshi Ray, Waruna Ranasinghe, Philips A. Gilbert, Pramod Shashidhara, Anoop Yadav, Distributed Multilevel Secure Data Stream Processing, Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems Workshops, Philadelphia, Pennsylvania, July 2013
Prabhakaran Murugesan, Indrakshi Ray, Audit Log Management in MongoDB, Proceedings of the IEEE World Congress on Services, Anchorage, Alaska, June 2014.
Andy Chunliang Hsu, Indrakshi Ray, Specification and Enforcement of Location-Aware Attribute-Based Access Control for Online Social Networks, Proceedings of the ACM International Workshop on Attribute Based Access Control, New Orleans, Louisiana, arch 2016.
Subhojeet Mukherjee, Noah Cain, Jacob Walker, David White, Indrajit Ray, Indrakshi Ray, POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, October 2017.