Generally described, a method, software system, and computer-readable
medium are provided for preventing a malware from colliding on a named
object. In accordance with one aspect, a method is provided for creating
a private namespace. More specifically, the method includes receiving a
request to create a private namespace that contains data for defining the
boundary of the private namespace from the current process. Then a
determination is made regarding whether a principle associated with the
current process has the security attributes that are alleged in the
request. In this regard, if the principle that is associated with the
current process has the security attributes that are alleged in the
request, the method creates a container object to implement the private
namespace that is defined by the data received in the request.