JSM 2005 - Toronto

Abstract #303328

This is the preliminary program for the 2005 Joint Statistical Meetings in Minneapolis, Minnesota. Currently included in this program is the "technical" program, schedule of invited, topic contributed, regular contributed and poster sessions; Continuing Education courses (August 7-10, 2005); and Committee and Business Meetings. This on-line program will be updated frequently to reflect the most current revisions.

To View the Program:
You may choose to view all activities of the program or just parts of it at any one time. All activities are arranged by date and time.



The views expressed here are those of the individual authors
and not necessarily those of the ASA or its board, officers, or staff.


The Program has labeled the meeting rooms with "letters" preceding the name of the room, designating in which facility the room is located:

Minneapolis Convention Center = “MCC” Hilton Minneapolis Hotel = “H” Hyatt Regency Minneapolis = “HY”

Back to main JSM 2005 Program page



Legend: = Applied Session, = Theme Session, = Presenter
Activity Number: 311
Type: Topic Contributed
Date/Time: Tuesday, August 9, 2005 : 2:00 PM to 3:50 PM
Sponsor: Section on Government Statistics
Abstract - #303328
Title: Comparing Ways of Using 'Protection Flow' To Protect Magnitude Data Tables from Disclosures
Author(s): Paul B. Massell*+
Companies: U.S. Census Bureau
Address: 4700 Silverhill Road, Washington, DC, 20233, United States
Keywords: disclosure avoidance ; confidentiality ; cell suppression ; magnitude data tables ; controlled tabular adjustment ; mathematical programming
Abstract:

We use the term "protection flow" to describe any solution to a mathematical programming model that describes perturbations (i.e., modifications) of table cell values that preserve table additivity. This term is meant to generalize "network flow." Network flow models have been used to describe such perturbations for simple two-dimensional tables. Protection flow models can be constructed for tables of any dimension and degree of hierarchy. Cell suppression is one way of using the protection flow to construct a table with sufficient protection for the sensitive cells. We compare cell suppression with new ways (e.g., controlled tabular adjustment, variable base rounding, uncertainty intervals) of using the perturbations to provide disclosure protection.


  • The address information is for the authors that have a + after their name.
  • Authors who are presenting talks have a * after their name.

Back to the full JSM 2005 program

JSM 2005 For information, contact jsm@amstat.org or phone (888) 231-3473. If you have questions about the Continuing Education program, please contact the Education Department.
Revised March 2005