Building a trusted computing base
Principles, Patterns and Technical Layers of a Secure System