Building a trusted computing base
Trusted Path