Tunneling in MIS structures—I. Theory