XIN JIN
Contact **** ********* **, *** ****, San Antonio, TX, 78230, USA
http://my.cs.utsa.edu/ xjin/
210-***-**** ********@*****.***
Research Area Cloud Computing, Cyber Security
Education PhD Candidate, University of Texas at San Antonio (UTSA) 01/2010 - 05/2014 (expected)
• GPA: 3.94/4 Advisor: Dr. Ravi Sandhu Co-Advisor: Dr. Ram Krishnan
• Thesis: Attribute Based Access Control Models and Cloud IaaS Implementation (ongoing)
B. Eng., Central South University (CSU), Changsha, China 09/2005 - 06/2009
• GPA: 88/100 Advisor: Prof. Anfeng Liu Top 10% in 327
• Thesis: Energy Hole Avoiding in Wireless Sensor Network Through Efficient Routing
Specialities Languages: Java, Python, C, C++, HTML, XACML, XML, JSON, Shell, JavaScript, SQL
Tools: AWS Boto, Git, Latex, Eclipse, Flask, Devstack, Vim, OMNeT++, MFC, Visual Studio, VNC
Systems: AWS, Openstack, Windows, Unix/Linux
Skills: Strong in algorithm and data structure, communication and writing
Experience Research Scholar 09/2011 - Present
Institute for Cyber Security, University of Texas at San Antonio
• Research traditional access control models, design and analyze Attribute Based Access Control
(ABAC) model with focus on flexibility, usability and fine-grained authorization
• Research cloud computing techniques and platforms such as Openstack and AWS, analyze and
summarize the limitations of their access control management component
• Define reachability analysis safety threat model, relate with planning problems in artificial in-
telligence (AI), prove PSPACE-completeness, design polynomial time solvable algorithms
• Show proof of concept of ABAC model by designing and implementing it in Openstack
Teaching Assistant 12/2009 - 06/2011
Department of Computer Science, University of Texas at San Antonio
• Taught C programming languages for 3 consecutive semesters for classes of 40+
• Designed and graded homework and exams and tutored students (positive feedback received)
Research Assistant 09/2008 - 12/2009
Network Research Lab, Central South University, Changsha, China
• Identified the energy hole problem for the first time, designed and implemented energy efficient
routing algorithms to avoid energy hole problem to achieve even energy consumption
• Implemented algorithms using OMNeT++, analyzed experiment data and evaluate performance
Selected Research Projects in Openstack, deep understanding of deployment, configuration and development.
And Course Projects
Integrated Cloud Service on Openstack and AWS (Python) 10/2013 -present
Role: Member. Based on the concept of hybrid cloud, we develop a platform to manage openstack
and AWS resources. We extend Openstack to interact with both Openstack and AWS to manage VMs,
images, etc. in a single console.
Openstack Access Control Component Based on ABAC (Python) 01/2013 - present
Role: Leader. Research on access control models for IaaS clouds: Openstack and AWS IAM. Design
ABAC models and administration models to support fine-grained authorization and ease of admin-
istration for IaaS Cloud. Design different enforcement models and implement them on Openstack
platform. Installed private cloud manually using Openstack on physical machines and enhance it to
support ABAC. Evaluate their performances and discuss pros and cons.
Authorization as a Service for Openstack (Python) 05/2013 - 09/2013
Role: Leader. Installed Openstack on a single machine using Devstack. Reverse engineered com-
munication mechanisms among various Openstack components and authentication mechanism using
PKI. Designed and implemented a policy decision service to support centralized policy administration
and policy evaluation through REST function call. Improved the throughput of the policy evaluation
service by removing redundant token decoding process.
Web-based User Interface for Swift Storage (Python) 09/2012 - 11/2012
Role: Leader. Installed Swift on five virtual machines and configured network setting. Designed
and implemented a web-based server and client using Flask and Swift Python API to support file
download, upload, container management and access control based on access control list.
Relational database management system (Java) 02/2011 - 05/2011
Role: Leader. Designed and implemented a relational database management system (RDBMS) Mini-
base. Implement a parser, optimizer, buffer pool manager, storage mechanisms (heap files, secondary
indexes based on B+ Trees), and a disk space management system.
Stock Exchange Platform using RMI (Java) 04/2010 - 05/2010
Role: Leader. Designed stock servers, bank servers, naming service servers, stock and bank clients
using Java RMI, with serializable, reflection, proxy pattern and multithread. Used database to store
stock, bank account and customer information. Implemented in multithread to improve throughput.
Publications Cyber Security And Cloud Computing
• Xin Jin, Ram Krishnan and Ravi Sandhu, Design and Implementation of Attribute Based Ac-
cess Control for IaaS Cloud. To be submitted to Conference.
• Xin Jin, Ram Krishnan and Ravi Sandhu, Unified Attribute based Access Control Model Cov-
ering RBAC Extensions, To be submitted to Journal.
• Xin Jin, Ram Krishnan and Ravi Sandhu, Reachability Analysis of Role based Administration
of User Attributes, ACM DIM, Berlin, Germany, 2013
• Xin Jin, Ram Krishnan and Ravi Sandhu, A Role Based Administration Model for Attribute.
International Workshop on Secure and Resilient Architectures and Systems (WSRAS), Min-
neapolis, Minnesota, 2012
• Xin Jin, Ravi Sandhu and Ram Krishnan, RABAC: Role-Centric Attribute-Based Access Con-
trol. In MMM-ACNS, St. Petersburg, Russia, 2012
• Xin Jin, Ram Krishnan and Ravi Sandhu, A Unified Attribute-Based Access Control Model
Covering DAC, MAC and RBAC. IFIP WG 11.3 DBSec 2012, Paris, France.
(cited 22 times according to Google Scholar)
Wireless Sensor Network
• Anfeng Liu, Zhenghua Liu, Mohammed Nurudeen, Xin Jin, and Zhigang Chen. An elabo-
rate chronological and spatial analysis of energy hole for wireless sensor networks. Computer
Standards and Interfaces,35(1):132, 2013
• Anfeng Liu, Xin Jin, Guohua Cui, Zhigang Chen, Deployment guidelines for achievibng max-
imum lifetime and avoiding energy holes in sensor network. Journal of Information Sciences,
Volume: 230, Pages:197-226, Elsevier, 2013