Rutgers The State University of New Jersey Newark Campus Ph.D. Program – IT Major Applications of Database Systems 26:198:731 Spring 2008 Tuesdays 2:30 – 5:20 pm, Newark, Ackerson Hall, Room 200J Instructor Prof. Nabil Adam Office : 200Q Ackerson Hall (Newark) Office Hours : Mondays 12 – 1:00pm and by appointment Telephone : 973-353-5239 Fax : 973-353-5808 E-mail’ : adam@adam.rutgers.edu Homepage : http://cimic.rutgers.edu/~adam Call 973-353-1766 or 732-932-1766 for Official University/Campus closings Purpose: The purpose of this course is to present advanced topics in database systems and delve into research in these areas. The topics include distributed, object-oriented, active, deductive and temporal databases, as well as advanced application domains that influence database research such as Internet, workflows, digital libraries and electronic commerce. Prerequisite: 22:198:603 (Database Systems) or equivalent. Reading Material: There is no text assigned to this course at the moment. However, the following books either cover one topic in depth or cover some of the preliminary concepts of the topics. In addition to the books listed below, the reading list includes a number of research papers. 1. A. Silberschatz, H. Korth and S. Sudarshan, Database System Concepts, 5th Edition, Mc-Graw Hill, 2006 2. Elmasri and Navathe, Fundamentals of Database Systems, 4th Edition, AddisonWesley, 2003 3. Raghu Ramakrishnan, Database Management Systems McGraw-Hill, 3rd Edition 2001, McGraw Hill 4. Michael Papazoglu, Web Services: Principles and Technology, Prentice Hall Publishers, 2007 5. Vijay Atluri, Sushil Jajodia and Binto George, Multilevel Secure Transaction Processing, Kluwer Academic Publishers, 1999. 6. Current projects funded by NSF 7. The DBLP Bibiliography An Excellent source for the Research materials in the Database area Expected Work: 1. Presentation, and Home Work Assignments 20% a. Applications of the topics covered in the first half of the course b. Programming Assignments related to some of the topics discussed in the first half of the course 2. Research Paper/Project and Presentation 30% a. Either, write a comprehensive survey paper on one of the topics as agreed upon with the instructor. b. Or, implement the following : i. Semantic-based service discovery/matching using Description Logics ii. Using protégé or any other ontology editing tool, implement a disaster management ontology in OWL format that facilitates sharing of disaster management related information through Web services. iii. Implement the commutative encryption-based technique for computing the EQUI JOIN of database tables from distributed sources in a privacy-preserving manner. The privacy requirement entails that the records in the Final JOIN table cannot be linked to individuals. This project will be implemented in the context of healthcare data integration where data from different sources need to be joined on the patient’s identifier. iv. Using sequence mining techniques, implement a software project that focus on identifying temporal patterns from a sample data set (clinical dataset or stock dataset). 3. Mid-term Examinations 25% a. Will include one question comparing the recent work on the various aspects of Database Systems with the research papers listed in the course handout. Student need to identify their own topic for this comparison. 4. Final Examinations 25% Jan. 22 Course Overview, Distributed Databases, and Web Information System Vision Reading Assignment 1. Chapter 20,21,22 from 1 and Chapter 25 from 2. Jan. 29 Semantic Web + Ontologies Reading Assignment: 1. The Semantic Web Scientific American Paper by Tim Berners Lee et al. (http://www.sciam.com/article.cfm?articleID=00048144-10D2-1C7084A9809EC588EF21) 2. Katifori, A., Halatsis, C., Lepouras, G., Vassilakis, C., and Giannopoulou, E. 2007. Ontology visualization methods—a survey. ACM Comput. Surv. 39, 4 (Nov. 2007) 3. Benjamins, V. R., Contreras, J. , Six Challenges for the Semantic Web, White Paper, Intelligent Software Components, S.A., April 2002. Additional Reading: 1. Noy, N. F., and McGuinness, D. L., Ontology Development 101: A Guide to Creating Your First Ontology, Stanford Knowledge Systems Laboratory Technical Report KSL-01-05 and Stanford Medical Informatics Technical Report SMI-2001-0880, March 2001. 2. Gomez-Perez et al. Ontology Languages for the Semantic Web. In IEEE Intelligent Systems, 17(1):54-60, 2002. 3. Knublauch, H., Fergerson, R.W., Fridman, N., Noy, N., and Musen, M.A., The Protégé OWL Plugin: An Open Development Environment for Semantic Web Applications. In Proceedings of the 3rd International Semantic Web Conference, 2004. Feb 5 and12 Semantic Web Services Reading Assignment Service Oriented Architecture (SOA) and Web Services 1. Chapters 1, 5, 6 and 8 from 4 (Web Services: Principles and Technology by Papazoglu) 2. (http://webservices.xml.com/pub/a/ws/2003/09/30/soa.html) 3. Sheila A. McIlraith, Tran Cao Son, and Honglei Zeng, Semantic Web Services, IEEE Intelligent Systems, 2002 4. Olaf Zimmermann, Vadim Doubrovski, Jonas Grundler, Kerard Hogg Serviceoriented architecture and business process choreography in an order management scenario: rationale, concepts, lessons learned, Companion to the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications OOPSLA '05 Semantic Web Services 1. Chapter 13 from 4 (Web Services: Principles and Technology by Papazoglu) 2. Christoph Bussler, Dieter Fensel, Alexander Maedche. A Conceptual Architecture for Semantic Web Enabled Web Services. In ACM SIGMOD Record, 31(1):6772, 2002. 3. Abhijit Patil, Swapna Oundhakar, Amit Sheth, and Kunal Verma. METEOR-S Web Service Annotation Framework. In Proceedings of WWW, 2004. 5. Brahim Medjahed, Athman Bouguettaya, Ahmed K. Elmagarmid Composing Web services on the Semantic Web, The VLDB Journal (2003). Semantic-based Service Discovery and Matching using Description Logics 1. Daniele Nardi, Ronald J. Brachman Description Logics, An Introduction to Description Logics 2. Franz Baader, Werner Nutt, Basic Description Logics 3. Description Logics for Matchmaking of Services. http://www.hpl.hp.com/techreports/2001/HPL-2001-265.pdf Feb19 and Feb 26 Data Mining and Data Warehousing Reading Assignment: 1. Chapter 18 from 1; Chapters 27 and 28 from 2; Chapter 26 from 3 2. Rakesh Agrawal and Ramakrishnan Srikant. Privacy-preserving data mining. In Proceedings of the 2000 ACM SIGMOD Conference on Management of Data, pages 439-450, Dallas, TX, May 14-19 2000. ACM March 4 Privacy-preserving Data Integration and Interoperability March 11 Mid-term Exam March 25 Database Security Reading Assignment: 1. Chapter 8 from 1; Chapter 23 from 2; and Chapter 21 from 3 2. Elisa Bertino and Ravi Sandhu, “Database Security—Concepts, Approaches, and Challenges,” IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 1, January-March 2005 3. David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn and Ramaswamy Chandramouli, “Proposed NIST Standard for Role-Based Access Control”, ACM Transactions on Information and Systems Security (TISSEC), Volume 4, Number 3, August 2001. April 1 Privacy-preserving Data Mining Reading Assignment: (Chapter 18 from 1; Chapter 27 from 2; and Chapter 26 from 3) April 8 Workflow Management Workflow Overview, Inter-organizational workflows, Automatic composition of Eservices, dynamic changes in workflows, Web-scale workflows, Decentralized workflow execution & security Reading Assignment: 1. Dimitrios Georgakopoulos, Mark Hornick and Amit Sheth, An overview of workflow management: From process modeling to workflow automation infrastructure, Distributed and Parallel Databases, Volume 3, Number 2 / April, 1995 2. G. Shegalov, M. Gillmann, and G. Weikum, XML-enabled Workflow Management for. E-Services across Heterogeneous Platforms, The VLDB Journal, 10(1):91-103, 2001 3. Fabio Casati Ming-chien Shan, Dynamic and adaptive composition of e-services Inf. Syst. 26(3), 2001: 143-163 2001 4. S. Chun,V. Atluri, N.R. Adam, Domain knowledge-based automatic workflow generation, in: Proc. 13th Internat. Conf. on Database and Expert Systems Applications (DEXA), Aix en Provence, France, September 2002. 5. Issam Chebbi, Schahram Dustdar and Samir Tata, The view-based approach to dynamic inter-organizational workflow cooperation, Data & Knowledge Engineering, Volume 56, Issue 2, February 2006, Pages 139-173 6. Stefanie Rinderle , Manfred Reichert, Peter Dadam, Correctness criteria for dynamic changes in workflow systems––a survey, Data & Knowledge Engineering 50 (2004) 9–34 7. M. Brian Blake and Michael N. Huhns, "Web-Scale Workflow: Integrating Distributed Services", IEEE Internet Computing, vol. 12, no. 1, 2008, pp. 55-59. 8. Vijayalakshmi Atluri, Soon Ae Chun, & Pietro Mazzoleni, Chinese Wall Security for Decentralized Workflow Management Systems, Journal of Computer Security, Volume 12, Number 6, November 2004, pp 799-840. April 15, 22, 29 Student Presentations May 6 Final Exam