Tunneling in MIS structures—I: Theory