CS 533: Database Management Systems (Fall 2019)
All important announcements will be posted on Canvas. If the Canvas is inaccessible, the announcement will be posted here.
The objective is to understand the theoretical underpinnings as well as
the implementation techniques of the different components of a Database
System, with special emphasis on Distributed
Databases. The course will also touch upon
Data Streams and Data Processing in Cloud Computing.
Lectures: M,W 2:00 PM - 3:15 PM at CSB 425.
Previous enrollment in CS 430 or Permission of the Instructor.
Database Management Systems (Third Edition) by R. Ramakrishnan and J. Gehrke,
published by McGraw-Hill.
Control and Recovery in Database Systems by P.A. Bernstein, V.
Hadzilacos and N. Goodman, published by Addison-Wesley, 1987.
Principles of Distributed Database Systems by M. Tamer Ozsu and P. Valduriez,
Third Edition, published by Prentice Hall, 2011.
|Review of Query Processing
|| (Ram. Ch. 12,14,15)
|Review of Centralized Concurrency Control
|Review of Centralized Recovery
|Distributed Query Processing
|Distributed Concurrency Control
||(Ozsu Ch. 11)
||(Ozsu Ch. 12)
|Access Control in Databases
||(Ozsu Ch. 5) & Papers
||(Bern. Ch. 8, Ozsu Ch. 13) & Papers
|Mobile Database Systems
|Peer-to-Peer Data Management
||(Ozsu Ch. 16)
||(Ozsu Ch. 18) & Papers
|Data Management in Cloud Computing
||(Ozsu Ch. 18) & Papers
Lecture Notes will be posted on Canvas.
A publishable quality term paper automatically gets you an A in the course.
A student can work
on any topic of his/her choice but it must be approved by the instructor.
Each student has to prepare a 15 minute presentation to the class describing
his/her work. This includes time for questioning.
- Indrakshi Ray and Tai Xin,
Concurrent and Real-Time Update of Access
Control Policies, Proceedings of the 14th International Conference on
Database and Expert Systems, Prague, Czech Republic, September 2003.
- Indrakshi Ray, Ross M. McConnell, Monte Lunacek, and Vijay Kumar,
Reducing Damage Assessment Latency in Survivable Databases, Proceedings of the 21st British National Conference on Databases, Edinburgh, Scotland, July 2004.
- Indrakshi Ray, Tai Xin and Yajie Zhu,
Task Dependencies During Workflow Recovery, Proceedings of he 15th International Conference on Database and Expert Systems, Zaragoza, Spain, August 2004.
- Indrakshi Ray and Mariana Muller,
Schemas to Simplify Access Control for XML Documents>, Proceedings of
the International Conference on Distributed Computing and Internet
Technologies, Bhubaneswar, India, December 2004.
- Shuxin Yin and Indrakshi Ray,
Relational Database Operations Modeling with UML, Proceedings of
the 19th International Conference on Advanced Information Networking
and Applications, Taipei, Taiwan, March 2005.
- Indrakshi Ray and Lijun Yu
Short Paper: Towards a Location-Aware Role-Based Access Control Model, Proceedings of the 1st IEEE Conference on Security and Privacy for
Emerging Areas in Communication Networks, Athens, Greece, September 2005.
- Indrakshi Ray and Wei Huang,
Event Detection in Multi-level Secure Databases, Proceedings of the
1st International Conference on Secure Systems, Kolkata, India, December 2005.
- Jinyoo Kim, Yashwant K. Malaiya and Indrakshi Ray,
Vulnerability Discovery in Multi-Version Software Systems,
Proceedings of the 10th IEEE High Assurance Systems Engineering
Symposium, Dallas, Texas, November 2007.
Xing Xie, Indrakshi Ray, Waruna Ranasinghe, Philips A. Gilbert, Pramod Shashidhara, Anoop Yadav,
Distributed Multilevel Secure Data Stream Processing,
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems Workshops,
Philadelphia, Pennsylvania, July 2013
Prabhakaran Murugesan, Indrakshi Ray,
Audit Log Management in MongoDB, Proceedings of the
IEEE World Congress on Services, Anchorage, Alaska, June 2014.
- Andy Chunliang Hsu, Indrakshi Ray,
Specification and Enforcement of Location-Aware Attribute-Based Access Control for Online Social Networks,
Proceedings of the ACM International Workshop on Attribute Based Access Control, New Orleans, Louisiana,
Subhojeet Mukherjee, Noah Cain, Jacob Walker, David White, Indrajit Ray, Indrakshi Ray,
POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles,
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, October
There is no late policy. Your project/term paper is due before class on the due date. The due date may be extended only under exceptional circumstances.
Exams must be taken individually.
All parties involved in cheating will be prosecuted no matter who copied
Please be aware of the departmental cheating policy.
| Vignesh Pagadala
| Office Hours: Make appointment please
| Office: 460 CSB
| Phone: (970) 491-6275
| Fax: (970) 491-2466
| Email: vignesh.pagadala[at]colostate.edu