Building a trusted computing base
Authority vs. Permission