Rutgers The State University of New Jersey

advertisement
Rutgers The State University of New Jersey
Newark Campus
Ph.D. Program – IT Major
Applications of Database Systems
26:198:731
Spring 2008
Tuesdays 2:30 – 5:20 pm, Newark, Ackerson Hall, Room 200J
Instructor
Prof. Nabil Adam
Office
: 200Q Ackerson Hall (Newark)
Office Hours : Mondays 12 – 1:00pm and by appointment
Telephone : 973-353-5239
Fax
: 973-353-5808
E-mail’
: adam@adam.rutgers.edu
Homepage : http://cimic.rutgers.edu/~adam
Call 973-353-1766 or 732-932-1766 for Official University/Campus closings
Purpose: The purpose of this course is to present advanced topics in database systems
and delve into research in these areas. The topics include distributed, object-oriented,
active, deductive and temporal databases, as well as advanced application domains that
influence database research such as Internet, workflows, digital libraries and electronic
commerce.
Prerequisite: 22:198:603 (Database Systems) or equivalent.
Reading Material: There is no text assigned to this course at the moment. However, the
following books either cover one topic in depth or cover some of the preliminary
concepts of the topics. In addition to the books listed below, the reading list includes a
number of research papers.
1. A. Silberschatz, H. Korth and S. Sudarshan, Database System Concepts, 5th Edition,
Mc-Graw Hill, 2006
2. Elmasri and Navathe, Fundamentals of Database Systems, 4th Edition, AddisonWesley, 2003
3. Raghu Ramakrishnan, Database Management Systems McGraw-Hill, 3rd Edition
2001, McGraw Hill
4. Michael Papazoglu, Web Services: Principles and Technology, Prentice Hall
Publishers, 2007
5. Vijay Atluri, Sushil Jajodia and Binto George, Multilevel Secure Transaction
Processing, Kluwer Academic Publishers, 1999.
6. Current projects funded by NSF
7. The DBLP Bibiliography An Excellent source for the Research materials in the
Database area
Expected Work:
1. Presentation, and Home Work Assignments 20%
a. Applications of the topics covered in the first half of the course
b. Programming Assignments related to some of the topics discussed in the
first half of the course
2. Research Paper/Project and Presentation 30%
a. Either, write a comprehensive survey paper on one of the topics as agreed
upon with the instructor.
b. Or, implement the following :
i. Semantic-based service discovery/matching using Description
Logics
ii. Using protégé or any other ontology editing tool, implement a
disaster management ontology in OWL format that facilitates
sharing of disaster management related information through Web
services.
iii. Implement the commutative encryption-based technique for
computing the EQUI JOIN of database tables from distributed
sources in a privacy-preserving manner. The privacy requirement
entails that the records in the Final JOIN table cannot be linked to
individuals. This project will be implemented in the context of
healthcare data integration where data from different sources need
to be joined on the patient’s identifier.
iv. Using sequence mining techniques, implement a software project
that focus on identifying temporal patterns from a sample data set
(clinical dataset or stock dataset).
3. Mid-term Examinations 25%
a. Will include one question comparing the recent work on the various
aspects of Database Systems with the research papers listed in the course
handout. Student need to identify their own topic for this comparison.
4. Final Examinations 25%
Jan. 22 Course Overview, Distributed Databases, and Web Information
System Vision
Reading Assignment
1. Chapter 20,21,22 from 1 and Chapter 25 from 2.
Jan. 29 Semantic Web + Ontologies
Reading Assignment:
1. The Semantic Web Scientific American Paper by Tim Berners Lee et al.
(http://www.sciam.com/article.cfm?articleID=00048144-10D2-1C7084A9809EC588EF21)
2. Katifori, A., Halatsis, C., Lepouras, G., Vassilakis, C., and Giannopoulou, E.
2007. Ontology visualization methods—a survey. ACM Comput. Surv. 39, 4
(Nov. 2007)
3. Benjamins, V. R., Contreras, J. , Six Challenges for the Semantic Web, White
Paper, Intelligent Software Components, S.A., April 2002.
Additional Reading:
1. Noy, N. F., and McGuinness, D. L., Ontology Development 101: A Guide to
Creating Your First Ontology, Stanford Knowledge Systems Laboratory
Technical Report KSL-01-05 and Stanford Medical Informatics Technical Report
SMI-2001-0880, March 2001.
2. Gomez-Perez et al. Ontology Languages for the Semantic Web. In IEEE
Intelligent Systems, 17(1):54-60, 2002.
3. Knublauch, H., Fergerson, R.W., Fridman, N., Noy, N., and Musen, M.A., The
Protégé OWL Plugin: An Open Development Environment for Semantic Web
Applications. In Proceedings of the 3rd International Semantic Web Conference,
2004.
Feb 5 and12 Semantic Web Services
Reading Assignment
Service Oriented Architecture (SOA) and Web Services
1. Chapters 1, 5, 6 and 8 from 4 (Web Services: Principles and Technology by
Papazoglu)
2. (http://webservices.xml.com/pub/a/ws/2003/09/30/soa.html)
3. Sheila A. McIlraith, Tran Cao Son, and Honglei Zeng, Semantic Web Services,
IEEE Intelligent Systems, 2002
4. Olaf Zimmermann, Vadim Doubrovski, Jonas Grundler, Kerard Hogg Serviceoriented architecture and business process choreography in an order management
scenario: rationale, concepts, lessons learned, Companion to the 20th annual
ACM SIGPLAN conference on Object-oriented programming, systems,
languages, and applications OOPSLA '05
Semantic Web Services
1. Chapter 13 from 4 (Web Services: Principles and Technology by Papazoglu)
2. Christoph Bussler, Dieter Fensel, Alexander Maedche. A Conceptual Architecture
for Semantic Web Enabled Web Services. In ACM SIGMOD Record, 31(1):6772, 2002.
3. Abhijit Patil, Swapna Oundhakar, Amit Sheth, and Kunal Verma. METEOR-S
Web Service Annotation Framework. In Proceedings of WWW, 2004.
5. Brahim Medjahed, Athman Bouguettaya, Ahmed K. Elmagarmid Composing
Web services on the Semantic Web, The VLDB Journal (2003).
Semantic-based Service Discovery and Matching using Description Logics
1. Daniele Nardi, Ronald J. Brachman Description Logics, An Introduction to
Description Logics
2. Franz Baader, Werner Nutt, Basic Description Logics
3. Description
Logics
for
Matchmaking
of
Services.
http://www.hpl.hp.com/techreports/2001/HPL-2001-265.pdf
Feb19 and Feb 26 Data Mining and Data Warehousing
Reading Assignment:
1. Chapter 18 from 1; Chapters 27 and 28 from 2; Chapter 26 from 3
2. Rakesh Agrawal and Ramakrishnan Srikant. Privacy-preserving data mining.
In Proceedings of the 2000 ACM SIGMOD Conference on Management of
Data, pages 439-450, Dallas, TX, May 14-19 2000. ACM
March 4 Privacy-preserving Data Integration and Interoperability
March 11 Mid-term Exam
March 25 Database Security
Reading Assignment:
1. Chapter 8 from 1; Chapter 23 from 2; and Chapter 21 from 3
2. Elisa Bertino and Ravi Sandhu, “Database Security—Concepts, Approaches, and
Challenges,” IEEE Transactions on Dependable and Secure Computing, Vol. 2,
No. 1, January-March 2005
3. David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn and
Ramaswamy Chandramouli, “Proposed NIST Standard for Role-Based Access
Control”, ACM Transactions on Information and Systems Security (TISSEC),
Volume 4, Number 3, August 2001.
April 1 Privacy-preserving Data Mining
Reading Assignment:
(Chapter 18 from 1; Chapter 27 from 2; and Chapter 26 from 3)
April 8 Workflow Management
Workflow Overview, Inter-organizational workflows, Automatic composition of Eservices, dynamic changes in workflows, Web-scale workflows, Decentralized workflow
execution & security
Reading Assignment:
1. Dimitrios Georgakopoulos, Mark Hornick and Amit Sheth, An overview of
workflow management: From process modeling to workflow automation
infrastructure, Distributed and Parallel Databases, Volume 3, Number 2 / April,
1995
2. G. Shegalov, M. Gillmann, and G. Weikum, XML-enabled Workflow
Management for. E-Services across Heterogeneous Platforms, The VLDB
Journal, 10(1):91-103, 2001
3. Fabio Casati Ming-chien Shan, Dynamic and adaptive composition of e-services
Inf. Syst. 26(3), 2001: 143-163 2001
4. S. Chun,V. Atluri, N.R. Adam, Domain knowledge-based automatic workflow
generation, in: Proc. 13th Internat. Conf. on Database and Expert Systems
Applications (DEXA), Aix en Provence, France, September 2002.
5. Issam Chebbi, Schahram Dustdar and Samir Tata, The view-based approach to
dynamic inter-organizational workflow cooperation, Data & Knowledge
Engineering, Volume 56, Issue 2, February 2006, Pages 139-173
6. Stefanie Rinderle , Manfred Reichert, Peter Dadam, Correctness criteria for
dynamic changes in workflow systems––a survey, Data & Knowledge
Engineering 50 (2004) 9–34
7. M. Brian Blake and Michael N. Huhns, "Web-Scale Workflow: Integrating
Distributed Services", IEEE Internet Computing, vol. 12, no. 1, 2008, pp. 55-59.
8. Vijayalakshmi Atluri, Soon Ae Chun, & Pietro Mazzoleni, Chinese Wall Security
for Decentralized Workflow Management Systems, Journal of Computer Security,
Volume 12, Number 6, November 2004, pp 799-840.
April 15, 22, 29 Student Presentations
May 6 Final Exam
Download