5. Protection of server resources
Agents aren’t given references to resource objects
Proxy interposition [Shapiro 1986]
Proxy as identity-based capability [Gong 1989]
- access control
- dynamic revocation
- usage metering
Assumption: agent server is not malicious