A key component in trusted computing is the trusted execution technology architecture. By defining protocols for communication between partitions as well as application execution, trusted execution technology can help ensure that security is enforced. As with all standards, though, trusted execution technology only provides the protocols and framework to fulfill trust requirements. The responsibility lies with the creators and users of the system to properly implement and use the features inherent trusted execution technology.