Building a trusted computing base
Rule example