Furthermore
by verifying whether Mobile Agent has authority,
general results can usually be access or not,
and Mobile Agent system generally performs different functions or applications,
and different resources of each host of the network controlling requirements are also different.