C. Weather and F. , Forecasting Unknown Internet Worms Using Randomness Analysis, p.376

H. Park and S. , Heejo Lee, and Hoh Peter In Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds, 388 Yulong Zhang

G. Rookies and C. , A Trust-Based Institutional Online Supplier Recommendation Framework, p.400

H. Jiao, J. Liu, and .. , Jiuyong Li, and Chengfei Liu Security Economics A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation, p.412

D. Giuseppe, M. Acquisto, and .. Flamini, and Maurizio Naldi Optimizing Network Patching Policy Decisions, p.424

M. Theoharidou and .. , Alexios Mylonas, and Dimitris Gritzalis Empirical Benefits of Training to Phishing Susceptibility, p.457

H. Saevanee, N. L. Clarke, and M. Steven, Furnell Analysis and Modeling of False Synchronizations in 3G 475 Christoforos Ntantogian, Christos Xenakis, and Ioannis Stavrakakis Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks, p.489

L. L. Vrizlynn and .. , Thing and Hwei-Ming Ying Table of Contents XV Short Papers Authorization Policies for Materialized Views, p.525

S. Nait-bahloul, C. Keyboard, and .. , 531 Yongdong Wu and Zhigang Zhao Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach, p.537

M. Prandini, M. Mechanisms, O. Tasks-in-a-pervasive-ehealth-system, and .. , 555 Milica Milutinovic, Vincent Naessens, and Bart De Decker Web Services Security Assessment: An Authentication-Focused Approach 561 Yannis Soupionis and Miltiadis Kandias Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case, p.567