Security Constraints for Dedicated Systems