Conclusions
The mobile agent paradigm enables new classes of applications, optimizes/simplifies others
Security has been the primary obstacle
We demonstrated the feasibility of building a secure mobile agent infrastructure in Java
Secure agent migration, execution in protection domains
Protection of host resources against unauthorized, unaccounted usage
Detection of tampering with agent state
Primitives for mobile agent programming