Question:
(a) Give three advantages of using mobile agents.
(b) Distinguish between Static Itinerary Static Order (SISO) and Static Itinerary Dynamic Order (SIDO) mobility patterns.
(c) List the four popular mechanisms for protecting a host against malicious mobile codes.
(d) Describe five different ways of how a malicious host can cause a denial of service attack upon a mobile agent.
(e) Secure co-processors provide a hardware trusted computing base (TCB) for executing mobile agents such that they are protected from the host server. Describe how a TCB could also be implemented in software.