Consistency-Based System Security Techniques