Bayesian Methods Applied to the Database Inference Problem

We apply Bayesian estimation and network techniques to the database inference problem. Bayesian analysis permits the realistic estimation of probabilities of missing data as well as insight into how prior knowledge and observed data interact. We urge our community to exploit this powerful tool.

[1]  M. E. Maron,et al.  On Relevance, Probabilistic Indexing and Information Retrieval , 1960, JACM.

[2]  D. Madigan,et al.  Model Selection and Accounting for Model Uncertainty in Graphical Models Using Occam's Window , 1994 .

[3]  Gregory F. Cooper,et al.  A Bayesian method for the induction of probabilistic networks from data , 1992, Machine Learning.

[4]  Harry S. Delugach,et al.  Using Conceptual Graphs to Represent Database Inference Security Analysis , 1994 .

[5]  Kan Zhang IRI: A Quantitative Approach to Inference Analysis in Relational Databases , 1997, DBSec.

[6]  W. Buszkowski,et al.  On the logic of database dependencies , 1986 .

[7]  David Heckerman,et al.  Bayesian Networks for Knowledge Discovery , 1996, Advances in Knowledge Discovery and Data Mining.

[8]  Norman S. Matloff,et al.  Inference Control Via Query Restriction Vs. Data Modification: A Perspective , 1988, DBSec.

[9]  Harry S. Delugach,et al.  Wizard: A Database Inference Analysis and Detection System , 1996, IEEE Trans. Knowl. Data Eng..

[10]  D.G. Marks,et al.  Inference in MLS Database Systems , 1996, IEEE Trans. Knowl. Data Eng..

[11]  Matthew Morgenstern,et al.  Controlling logical inference in multilevel database systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[12]  Randall P. Wolf,et al.  A Framework for Inference-Directed Data Mining , 1996, DBSec.

[13]  Eric Horvitz,et al.  Structure and chance: melding logic and probability for software debugging , 1995, CACM.

[14]  Wray L. Buntine Operations for Learning with Graphical Models , 1994, J. Artif. Intell. Res..

[15]  Sujeet Shenoi,et al.  Catalytic inference analysis: detecting inference threats due to knowledge discovery , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[16]  Judea Pearl,et al.  Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.

[17]  Jun S. Liu,et al.  Sequential Imputations and Bayesian Missing Data Problems , 1994 .

[18]  Oliver Costich,et al.  A classical automata approach to noninterference type problems , 1992, [1992] Proceedings The Computer Security Foundations Workshop V.

[19]  David J. Spiegelhalter,et al.  Sequential updating of conditional probabilities on directed graphical structures , 1990, Networks.

[20]  J. Berger Statistical Decision Theory and Bayesian Analysis , 1988 .

[21]  Richard J. Lipton,et al.  Secure databases: protection against user influence , 1979, TODS.

[22]  Tsau Young Lin,et al.  Security and Data Mining , 1995, DBSec.

[23]  Ira S. Moskowitz,et al.  Parsimonious downgrading and decision trees applied to the inference problem , 1998, NSPW '98.

[24]  John R. Anderson The Adaptive Character of Thought , 1990 .

[25]  Randall P. Wolf,et al.  Protecting databases from inference attacks , 1997, Comput. Secur..