Security for Mobile Agents:Authentication and State Appraisal

William M. Farmer, Joshua D. guttman, Vipin Swarup
The MITRE Corporation
http://citeseer.nj.nec.com/farmer96security.html

Protocol

Protocol: Not all state alterations can be detected.
Authentication = deducing which principal has made the request = use the theory of authentication developed by Lampson and his colleagues

Three phases in agent deployment

Three phases: