Systems and methods that enable execution of applications at appropriate
trust levels are described. These systems and methods can determine
appropriate trust levels by comparing applications' permitted trust
levels with their requested trust levels. These systems and method can
determine applications' permitted trust levels by comparing applications'
execution locations with their published locations. Applications can also
be executed at a restricted trust level at which potentially dangerous
operations are prohibited.