Research Article

Privacy Law Protection Based on the Information Security Assurance Algorithm

Figure 2

Time section of the information assurance model.