QUESTION
(a) Briefly describe three security requirements of an agent
(b) List four threats that may be caused by malicious hosts to mobile agents
(c) Describe the forward-proxy model for tracking agents
(d) Explain the SISO mobility pattern
(e) Give three examples of the use of mobile agent system