Security for Mobile Agents:Authentication and State Appraisal

William M. Farmer, Joshua D. guttman, Vipin Swarup
The MITRE Corporation


Protocol: Not all state alterations can be detected.
Authentication = deducing which principal has made the request = use the theory of authentication developed by Lampson and his colleagues

Three phases in agent deployment

Three phases: