– Protect the machine. The machine should be able to authenticate the agent’s
owner, assign resource limits based on this authentication, and prevent any
violation of the resource limits. To prevent both the theft or damage of
sensitive information and denial-of-service attacks, the resource limits must
include access rights (reading a certain file), maximum consumptions (total
CPU time), and maximum consumptions per unit time (total CPU time per
unit time).