Policies for resource use may also vary, depending on the application, and they may be subject to change over time.
For these reasons, protection can no longer be considered a matter of concern only to the designer of an operating system.
It should also be available as a tool for use by the application designer, so that resources of an application subsystem can be guarded against tampering or the influence of an error.