Future work
Experience with different classes of mobile agent applications
Support infrastructure, such as ‘yellow pages’ services, digital cash, negotiation protocols
Tools for specifying access control policies
Formal modelling and proof of security
Other approaches for agent state protection
- mobile cryptography (Sander & Tschudin)
- state appraisal functions (Farmer et al.)