Department of Computer Science and Engineering


Module 1 (10 (T) + 7(P) Hours)



Yüklə 370,5 Kb.
səhifə10/16
tarix08.08.2018
ölçüsü370,5 Kb.
#61766
1   ...   6   7   8   9   10   11   12   13   ...   16


Module 1 (10 (T) + 7(P) Hours)


Publish/Subscribe matching algorithm, event based systems, notification filtering mechanisms, Composite event processing, content based routing, content based models and matching, matching algorithms, distributed hash tables (DHT)
Module 2 (10 (T) + 7(P) Hours)

Distributed notification routing, content based routing algorithms, engineering event based systems, Accessing publish/subscribe functionality using APIs. Scoping, event based systems with scopes, notification mappings, transmission policies, implementation strategies for scoping.


Module 3 (10 (T) + 7(P) Hours)

Composite event detection, detection architectures, security, fault tolerance, congestion control, mobility, existing notification standards- JMS, DDS, HLA.


Module 4 (12 (T) + 7(P) Hours)

Topic based systems, Overlays, P2P systems, overlay routing, Case studies- REBECA, HERMES, Gryphon. Commercial systems- IBM Websphere MQ, TIBCO Rendezvous.


References:


  1. Gero Muhl, Ludger Fiege, Peter R. Pietzuch, Distributed Event Based Systems. Springer, 2006.

  2. Chris Britton and Peter Bye, IT Architectures and Middleware. Pearson Education, 2/e, 2005.

  3. Yanlei Diao, and Michael J. Franklin, Query Processing for High-Volume XML Message Brokering. VLDB 2003.

  4. Chee-Yong Chan, Minos Garofalakis and Rajeev Rastogi, RE-Tree: An Efficient Index Structure for Regular Expressions, VLDB, 2002.

  5. Peter R. Pietzuch, Brian Shand, Jean Bacon. A Framework for Event Composition in Distributed Systems, Proc. of the 4th Int. Conf. on Middleware, 2003.



CS4035 COMPUTER SECURITY

Pre-requisite: Nil




L

T

P

C

3

0

2

4

Total Hours: 70 Hrs  


Module 1 (10 (T) + 7(P) Hours)


Operating system security - Access Control – MAC, DAC, RBAC. Formal models of security - BLP, Biba, Chinese Wall and Clark Wilson. Overview of SE Linux. Software vulnerabilities - Buffer and stack overflow, Phishing. Malware - Viruses, Worms and Trojans.
Module 2 (14 (T) + 7(P) Hours)

Network Security - Security at different layers – IPSec / SSL / PGP. Security problems in network domain - DoS, DDoS, ARP spoofing and session hijacking. DNS attacks and DNSSEC. Cross-site scripting XSS worm, SQL injection attacks. Intrusion Detection Systems (IDS). DDoS detection and prevention in a network.


Module 3 (9 (T) + 7(P) Hours)

Security in current domains – WEP - Wireless LAN security - Vulnerabilities - frame spoofing. Cellphone security - GSM and UMTS security. Mobile malware - bluetooth security.


Module 4 (9 (T) + 7(P) Hours)

Security in current applications – Security case studies of Online banking and Credit Card Payment Systems. Challenges in security for web services and clouds.


References:

  1. Bernard Menezes, Network security and Cryptography, Cengage Learning India, 2010.

  2. B A Forouzan and D Mukhopadyay, Cryptography and Network Security, 2/e, Tata McGraw Hill, 2010.

  3. Dieter Gollmann, Computer Security, John Wiley, 2006.



CS4036 ADVANCED DATABASE MANAGEMENT SYSTEMS
Pre-requisite: CS3002 Database Management Systems


L

T

P

C

3

0

2

4

Total Hours: 70 Hrs  


Module 1 (10 (T) + 7(P) Hours)


Distributed database concepts - overview of client - server architecture and its relationship to distributed databases, Concurrency control Heterogeneity issues, Persistent Programming Languages, Object Identity and its implementation, Clustering, Indexing, Client Server Object Bases, Cache Coherence.
Module 2 (10 (T) + 7(P) Hours)

Parallel Databases: Parallel Architectures, performance measures, shared nothing/shared disk/shared memory based architectures, Data partitioning, Intra-operator parallelism, Pipelining, Scheduling, Load balancing, Query processing- Index based, Query optimization: cost estimation, Query optimization: algorithms, Online query processing and optimization, XML, DTD, XPath, XML

indexing, Adaptive query processing
Module 3 (10 (T) + 7(P) Hours)

Advanced Transaction Models: Savepoints, Sagas, Nested Transactions, Multi Level Transactions. Recovery: Multi-level recovery, Shared disk systems, Distributed systems 2PC, 3PC, replication and hot spares, Data storage, security and privacy- Multidimensional K- Anonymity, Data stream management.


Module 4 (12 (T) + 7(P) Hours)

Models of Spatial Data: Conceptual Data Models for spatial databases (e.g. pictogram enhanced ERDs), Logical data models for spatial databases: raster model (map algebra), vector model, Spatial query languages, Need for spatial operators and relations, SQL3 and ADT. Spatial operators, OGIS queries


References:


  1. Avi Silberschatz, Hank Korth, and S. Sudarshan. Database System Concepts, 5/e, McGraw Hill, 2005.

  2. S. Shekhar and S. Chawla. Spatial Databases: A Tour, Prentice Hall, 2003.

  3. Ralf Hartmut Guting, Markus Schneider, Moving Objects Databases Morgan Kaufman, 2005.

  4. R. Elmasri and S. Navathe, Fundamentals of Database Systems, Benjamin- Cummings, 5/e, 2007.


CS4037 CLOUD COMPUTING

Pre-requisite: CS4033 Distributed Computing




L

T

P

C

3

0

2

4

Total Hours: 70 Hrs  

Yüklə 370,5 Kb.

Dostları ilə paylaş:
1   ...   6   7   8   9   10   11   12   13   ...   16




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə