Protection: Access Matrices

Domains

Protection domains may be established on a per-process basis.

As we shall see, for example, it is possible for a Unix process to run in a different protection domain than that of the user on whose behalf it is being executed. (In the Unix case, this is determined by the program that the process is executing.)