Named pipes and security contexts