Building a trusted computing base
Security Libraries and Middleware
73.
Portable Interceptor