Philippe Janson est ingénieur électronicien diplômé de l'Université Libre de Bruxelles (ULB) et détient un Mastère et un Doctorat en sécurité informatique du Massachusetts Institute of Technology. De 1976 à 1996 il a enseigné le cours de systèmes d'exploitation à l'Ecole Polytechique de l'ULB. En 1976 il a rejoint le Laboratoire de Recherche d'IBM à Zurich, où il a travaillé sur les réseaux locaux (LAN), dont le Token Ring d'IBM. En 1986 il a travaillé sur des passerelles entre LANs au Laboratoire de Développement d'IBM à Austin, Texas. De retour à Zurich en 1987 il a mené divers projets sur les réseaux hétérogènes et la sécurité informatique. En 1995 il a pris la tête d'un nouveau Département d'Informatique au Laboratoire de Recherche d'IBM à Zurich. En 1995 il a été élu à l'Academie de Technologie d'IBM, dont il fut Vice President en 2000 et 2001, dirigeant en même temps les Relations Universitaires du Laboratoire d'IBM à Zurich. De 1995 à 2007 il géra aussi pour l'Europe la relation entre la Recherche et le Secteur des Services Financiers d'IBM. En 2001 il a rejoint en même temps le Conseil Consultatif de la Faculté d'Informatique et de Communication de l'Ecole Polytechnique Fédérale de Lausanne (EPFL) le Conseil de Recherche du Fonds National Suisse. De 2004 à 2007 il fut chargé du Programme de transfert de projets de Recherche vers les engagements commerciaux des Services d'IBM. De 2007 à 2009 il a dirigé une équipe de recherche axée sur la gestion des identités et de l'authentification d'utilisateurs informatiques. En 2010 il a quitté IBM pour prendre un poste de professeur à l'EPFL, enseignant les bases de l'informatique puis la sécurité informatique. A sa retraite en 2017, il a développé et enseigné des cours de formation en cyberdéfense pour l'armée suisse. Il détient une douzaine de brevets et a publié une cinquantaine d'articles et un livre de cours sur les Systèmes d'Exploitation.
Publications
Sélection de publications
P. Janson, H. Rudin, eds. Special Issue, Computer Networks 31 8 (Apr.1999)
Computer Network Security
P. Janson, G. Tsudik and M. Yung Proc. IEEE INFOCOM '97, Tokyo, Japan (Apr. 1997)
Scalability and Flexbility in Authentication Services: the KryptoKnight Approach
P. Janson and M. Waidner DuD, Datenschutz und Datensicherheit 20 6 (1996), 350-361
Electronic Payment Systems
P. Janson and G. Tsudik Comput. Commun. 18 9 (Sept.1995), 645-653
Secure and Minimal Protocols for Authenticated Key Distribution
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva and M. Yung IEEE J. Select. Areas in Comm. SAC-11 5 (1993), 679-693
Systematic Design of a Family of Attack-Resistant Authentication Protocols
Autres publications
Liste des brevets et publications
Patents List • P.A. Janson, H.R.Müller, E.H.Rothauser, "Flow control mechanism for block-switching nodes", US Patent 4,380,063 (filed 10 Jun. 1981). • W. Bux, H.R. Müller, P. Janson, D.T.W. Sze, "Method of transmitting information between stations attached to a unidirectional ring", EU Patent 0 054 077 (filed 8 Dec. 1980). • R.F. Bird, I.S. Gopal, P.A. Janson, S, Kutten, R.A. Molva, M.M. Yung, "Authentication protocols in communication networks", US Patent 5,148,479 (filed 10 Mar. 1991). • R.F. Bird, I.S. Gopal, A. Herzberg, P.A. Janson, S, Kutten, R.A. Molva, M.M. Yung, "Multi-party secure session / conference", US Patent 5,369,705 (filed 3 Jun. 1992). • P. Janson, G. Tsudik, "Method and system for authenticated key distribution in a communication system", EU Patent 0 711 480 (filed 27 Jul. 1993). • R. Hauser, P. Janson, R. Molva, G. Tsudik, E. Van Herreweghen, "Method and systems for changing the key or password in a secure distributed communication network", EU Patent 0 720 796 (filed 20 Sep. 1993). • P. Janson, H. Scherzer, "Data integrity in smart cards", US Patent 6,535,997 (filed 19 Mar. 2003). • P. Janson, A. Nadalin, N. Nagaratnam, "Security context maintenance within a distributed environment", US Patent (filed 2003). • P. Janson, T. Pietraszek, M. Schunter, C. Vanden Berghe, TRACK on Google Scholar “Computer program with meta-data management function”, US Patent (filed 31 Oct. 2005). • P. Janson, “Integrated software development system, method for enforcing input validation, computer arrangement and computer program product”, US Patent (filed 16 Dec. 2005). Publications • P. Janson, "Removing the Dynamic Linker from the Security Kernel of a Computing Utility", MAC-TR 132, Project MAC, Mass. Inst. of Tech., Cambridge, Mass. (June 1974). • P. Janson, "Dynamic Linking and Environment Initialization in a Multi-Domain Process", Proc. 5th ACM Symp. on Oper. Syst., Austin, Texas (Nov.1975), 43-50. • P. Janson, "Using Type Extension to Organize Virtual Memory Mechanisms", LCS-TR 167, Lab. for Comp. Sc., Mass. Inst. of Tech., Cambridge, Mass. (Sept.1976). • P. Janson, "Protection de l'Information dans les Systèmes d'Ordinateurs", Bull. de l'U. Libre de Bruxelles et de l'Union des Anciens Etudiants, no. 24 (Juin 1980), 78-88. • E. Rothauser, P. Janson, H.R.Müller, "Meshed-Star Networks for Local Communication Systems", Local Networks for Computer Communications, Proc. Int'l Workshop on Local-Area Computer Networks, Zurich (Aug. 1980), A. West & P. Janson (eds.), North-Holland, Amsterdam (1981). • P. Janson, "Using Type Extension to Organize Virtual Memory Mechanisms", ACM Op. Syst. Revw., 15 4 (1981), 6-38. • West, P. Janson (eds.), "Local Networks for Computer Communications: Proceedings of the IFIP Working Group 6.4 International Workshop on Local Networks", IBM Research, Zurich, Switzerland, 27-19 Aug. 1980, North-Holland (1981). • W. Bux, F. Closs, P. Janson, K. Kümmerle, H.R. Müller, "A Reliable Token-Ring System for Local-Area Communication", Proc. Nat'l Telecomm. Conf. Vol.1, IEEE, Piscataway, NJ (Nov. 1981), A2.2.1-A2.2.6 • W. Bux, F. Closs, P. Janson, K. Kümmerle, H.R. Müller, E. Rothauser, "A Local-Area Communication Network Based on a Reliable Token-Ring System", Local Computer Networks, Proc. IFIPS Int'l Symp. on Local Computer Networks, Florence, Italy (Apr.1982), edited by P.C. Ravasio, G. Hopkins and N. Naffah, North-Holland, Amsterdam (1982), 69-82. • P. Janson, L. Svobodova and E. Maehle, "Filing and Printing Services on a Local-Area Network", Proc. 8th IEEE Data Comm. Symp., IEEE Computer Society Press, Piscataway, NJ (1983), 211-220. • W. Bux, F. Closs, P. Janson, K. Kümmerle and H.R. Müller, "A Reliable Token-Ring System as Base for a Local Communication Network", Computer Science Series, Vol. 21, edited by V.H. Haase and W.J. Jaburek, Oldenbourg, Wien/Munchen (1983), 127-146. • W. Bux, F. Closs, P. Janson, K. Kümmerle and H.R. Müller, "A Reliable Token-Ring System for Local-Area Communications", Productivité et Informatique: Pour une Entreprise Dynamique, Proc. Conf. du Printemps Convention, Vol. 2, SICOB, Paris, (1983). • W. Bux, F. Closs, P. Janson, K. Kümmerle and H.R. Müller, "A Reliable Token-Ring System for Local-Area Communication", ECA LAN-Seminar RTS 83/1, European Seminar on Local Area Networks, European CAMAC Association, Geel, Belgium (1983), 11-16. • P. Janson and E. Mumprecht, "Addressing and Routing in a Hierarchy of Token-Rings", Ring Technology Local Area Networks, edited by I.N. Dallas and E.B. Spratt, Elsevier, Amsterdam, (1984), 97-109. • B. Meister, P. Janson, L. Svobodova, "File Transfer in Local-Area Networks: A Performance Study", Proc. 5th Int'l Conf. on Distr. Comp. Syst., Cat.No.85CH2149-3, IEEE Comp. Soc. Press, Silver Spring, MD (1985), 338-349. • P. Janson, "Operating Systems Structures and Mechanisms", Academic Press, London (1985), 1-267. • P. Janson, L. Svobodova and E. Maehle, "Filing and Printing Services on a Local-Area Network", Reprint in W. Stallings (ed.), "Local Network Technology" (2nd Edition), IEEE Comp. Soc. Press, Silver Spring, MD (1985), 401-410. • B. W. Meister, P. Janson, L. Svobodova, "Connection-Oriented Versus Connectionless Protocols: A Performance Study", IEEE Trans. Comp. C-34 12 (1985), 1166-1173. • P. Janson and A.A.R. Cockburn, "Adding Transparent Internetworking to a LAN Application Interface", Proc. EFOC/LAN 87, Basel, Switzerland, IGI Europe, Information Gatekeepers, Boston (1987), 287-293. • P. Janson and A.A.R. Cockburn, "Adding Transparent Internetworking to a LAN Application Surface", (Special Issue on Interconnection of Local-Area Networks), IEEE J. Select. Areas in Comm. SAC-5 9 (1987), 1471-1479. • S. Zatti and P. Janson, "Interconnecting Heterogeneous Networks to OSI with a Global Naming Scheme and Gateway Address Mapping", Proc. 1988 Int'l Zurich Seminar on Digital Communications, B. Plattner & P. Gunzburger (eds.), IEEE, Piscataway, NJ (1988), 247-251. • S. Zatti and P. Janson, "Interconnecting OSI and Non-OSI Networks Using an Integrated Directory Service", Computer Networks and ISDN Systems 15 4 (1988), 269-283. • L. Svobodova, P. Janson, E. Mumprecht, "OSI in Heterogeneous Environments", Proc. 2nd Int'l Symp. on Interoperable Information Systems ISIIS'88, Tokyo, Japan (Nov.1988), 25-35. • L. Svobodova, P. Janson, E. Mumprecht, "Heterogeneity and OSI", IEEE J. Select. Areas in Comm. SAC-8 1 (1990), 67-79. • P. Janson, R. Molva, S. Zatti, "Architectural Directions for Opening IBM Networks: The Case of OSI", Proc. IEEE GLOBECOM '91, Phoenix, AZ, IEEE, Piscataway, NJ (Dec.1991), 1722-27. • P. Janson, R. Molva, "Security in Open Networks and Distributed Systems", Comp. Netw. & ISDN Syst. 22 5, North Holland (1991), 323-346. • P. Janson, R. Molva, "Security in Open Networks and Distributed Systems: A State-of-the-Art Tutorial and Survey", Proc. 2nd IEEE Infocom Int'l Symp. on Integr. Netw. Mgmt., Washington, DC (Apr.1991). • R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva and M. Yung, "Systematic Design of Two-Party Authentication Protocols", Proc. CRYPTO 91, Santa Barbara, CA (Aug.1991). • P. Janson, R. Molva, "Taxonomy and Comparative Analysis of Authentication, Key Acquisition, and Sign-on Protocols in Computer Networks and Distributed Systems", Proc. Conf. on New Architectures for Comm., Paris (Oct. 1991). • P. Janson, R. Molva, S. Zatti, "Architectural Directions for Opening IBM Networks: The Case of OSI", IBM Systems J. 31 2 (1992), 313-335. • S. Zatti, P. Janson, "Security and Management Services in Open Networks and Distributed Systems", Proc. Interop'93, Paris (Oct. 1993). • R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva and M. Yung "Systematic Design of a Family of Attack-Resistant Authentication Protocols", IEEE J. Select. Areas in Comm. SAC-11 5 (1993), 679-693. • F. Piessens, B. De Decker and P. Janson, "Interconnecting Domains with Heterogeneous Key Distribution and Authentication Protocols", Proc. IEEE Comp. Soc. Symp. on Research in Security and Privacy, Oakland, CA, IEEE, Los Alamitos, CA (May 1993), 66-79. • S. Zatti, P. Janson, "Security and Management Services in Open Networks and Distributed Systems", Proc. Interop'94, Berlin (Jun.1994). • P. Janson, "KryptoKnight - Sichere Authentifikation Mathematisch Beweisbar", Telematik Spektrum 3 (1994), 87-88. • R. Hauser, P. Janson, R. Molva, G. Tsudik and E. Van Herreweghen, "Robust and Secure Password and Key Change Method", Proc. ESORICS '94, 3rd European Symp. on Research in Computer Security, ed. by D. Gollmann, Springer Verlag, Berlin (Nov.1994), 107-122. Reprinted in J. Comp. Security 4 1 (1996), 97-111. • R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva and M. Yung, "The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution", IEEE/ACM Trans. on Netw. 3 1 (1995), 31-41. • P. Janson and G. Tsudik, "Secure and Minimal Protocols for Authenticated Key Distribution", Comput. Commun. 18 9 (Sept.1995), 645-653 • P. Janson and R. Molva, “Information and Network Security”, Encyclopedia of Telecommunications, Vol. 9, F.E. Froehlich & A. Kent (eds.), Dekker (1995), 201-227. • P. Janson and M. Waidner, "Electronic Payment over Open Networks", Swiss Informatics Society 3 (1995), 10-15. • P. Janson and M. Waidner, "Electronische Zahlungssysteme", Computerworld 21 (May 1996) • P. Janson and M. Waidner, "Electronic Payment Systems", DuD, Datenschutz und Datensicherheit 20 6 (1996), 350-361. • N. Asokan, P. Janson, M. Steiner and M. Waidner, "The State of the Art in Electronic Payment Systems", IEEE Computer 30 9 (1997), 28-35. • P. Janson, "Mehr Sicherheit und Komfort mit Smartcards", Neue Zürcher Zeitung 220 (Sept.1997), B9. • P. Janson, G. Tsudik and M. Yung, "Scalability and Flexbility in Authentication Services: the KryptoKnight Approach", Proc. IEEE INFOCOM '97, Tokyo, Japan (Apr. 1997). • N. Asokan, P. Janson, M. Steiner and M. Waidner, "The State of the Art in Electronic Payment Systems" (in Japanese), Nikei Computer (Mar.1998). • P. Janson, "Kleinstcomputer im Kreditkartenformat", Computerworld 6 (Feb. 1999). • N. Asokan, P. Janson, M. Steiner and M. Waidner, "State of the Art in Electronic Payment Systems", Advances in Computers, Vol. 53, M. Zelkowitz (ed.), Academic Press (2000), 426-449. • P. Enslow Jr, P. Janson, H. Rudin (eds.) Special issue on computer network security Computer Networks, 31 8 (Apr. 1999) Elsevier North-Holland, Inc. New York, NY, USA. • F. Siebenlist, V. Welch, S. Tuecke, I. Foster, N. Nagaratnam, P. Janson, J. Dayka, A. Nadalin, "OGSA security roadmap" OGSA Security WG, Global Grid Forum, 2002. • S. Lightstone, J. Hellerstein, W. Tetzlaff, P. Janson, E. Lassettre, C. Norton, B. Rajaraman, L. Spainhower , "Towards Benchmarking Autonomic Computing Maturity", Proc. IEEE Intl. Conf. on Industrial Informatics, Banff, Alberta (Aug.2003). • B. E. Carpenter, P. A. Janson , "Abstract interdomain security assertions: A basis for extra-grid virtual organizations", IBM Systems Journal 43 4 (Nov.2004), 689-701. • P. A. Janson, E. Rütsche, "Service on demand" (in German), GDI Impuls Business Journal, Winter 2005, 36-41.