Protection domains may be established on a per-process basis.
As we shall see, for example, it is possible for a Unix process to
run in a different protection domain than that of the user on whose
behalf it is being executed. (In the Unix case, this is determined
by the program that the process is executing.)