Philippe Janson

Professor Emeritus
philippe.janson@epfl.ch +41 21 693 68 66
EPFL IC-DO
INJ 331 (Bâtiment INJ)
Station 14
CH-1015 Lausanne
+41 21 693 68 66
EPFL > IC > IC-DEC > PH-IC
Web site: Web site: https://ic.epfl.ch/page55549.html#former
Fields of expertise
IT security
Biography
Phil Janson got a BS in EE from the University of Brussels and MS, EE, and Ph.D. in Computer Science from the Massachusetts Institute of Technology. From 1976 to 1996 he held a tenured visiting lecturer position in Operating Systems at the U. of Brussels. In 1976 he joined IBM Research in Zurich, where he worked initially on high-speed packet switches and the IBM Token Ring. In 1986 he worked on LAN gateways at the IBM Development Lab in Austin, Texas. Back in Zurich in 1987 he managed several projects on heterogeneous networking and IT security. In 1995 he became head of the Computer Science Department at IBM Research's Zurich Lab. In 1995 he was elected to the IBM Academy of Technology, of which he was Vice President in 2000 and 2001, serving at the same time as Program Manager for University Relations at IBM Research's Zurich Lab. From 1995 to 2007 he was also Relationship Manager for Europe between IBM Research and the IBM Financial Services Sector. In 2001 he became a member of the Advisory Board of the Informatics and Communication Systems Dept of the Swiss Federal Institute of Technolgy in Lausanne (EPFL) and became a member of the Research Council of the Swiss National Foundation. From 2002 to 2004 he returned to an active research career as Senior Technical Staff Member, working on Web Services security. From 2004 to 2007 he was Program Manager for leveraging IBM Research Assets in IBM Global Services engagements. From 2007 to 2009 he managed a Research team focusing on user-centric identity and authentication technologies. In 2010 he retired from IBM then joined EPFL as a Professor, teaching IT security engineering and Introductory Computer Science until retiring in 2017. 2018-2019 he developed and gave cyberdefense courses for the Swiss armed forces. He holds a dozen patents and wrote over 50 papers in the areas of IT security and distributed systems as well as a book on Operating Systems. He received a Harkness Fellowship in 1972, and a number of IBM Invention and Outstanding Technical Contribution Awards since then. He was a member of the ACM and of the IEEE Computer Society.
Publications
Selected publications
P. Janson, H. Rudin, eds. Special Issue, Computer Networks 31 8 (Apr.1999) |
Computer Network Security |
P. Janson, G. Tsudik and M. Yung Proc. IEEE INFOCOM '97, Tokyo, Japan (Apr. 1997) |
Scalability and Flexbility in Authentication Services: the KryptoKnight Approach |
P. Janson and M. Waidner DuD, Datenschutz und Datensicherheit 20 6 (1996), 350-361 |
Electronic Payment Systems |
P. Janson and G. Tsudik Comput. Commun. 18 9 (Sept.1995), 645-653 |
Secure and Minimal Protocols for Authenticated Key Distribution |
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva and M. Yung IEEE J. Select. Areas in Comm. SAC-11 5 (1993), 679-693 |
Systematic Design of a Family of Attack-Resistant Authentication Protocols |
Other publications
Patents & publications list
Patents List • P.A. Janson, H.R.Müller, E.H.Rothauser, "Flow control mechanism for block-switching nodes", US Patent 4,380,063 (filed 10 Jun. 1981). • W. Bux, H.R. Müller, P. Janson, D.T.W. Sze, "Method of transmitting information between stations attached to a unidirectional ring", EU Patent 0 054 077 (filed 8 Dec. 1980). • R.F. Bird, I.S. Gopal, P.A. Janson, S, Kutten, R.A. Molva, M.M. Yung, "Authentication protocols in communication networks", US Patent 5,148,479 (filed 10 Mar. 1991). • R.F. Bird, I.S. Gopal, A. Herzberg, P.A. Janson, S, Kutten, R.A. Molva, M.M. Yung, "Multi-party secure session / conference", US Patent 5,369,705 (filed 3 Jun. 1992). • P. Janson, G. Tsudik, "Method and system for authenticated key distribution in a communication system", EU Patent 0 711 480 (filed 27 Jul. 1993). • R. Hauser, P. Janson, R. Molva, G. Tsudik, E. Van Herreweghen, "Method and systems for changing the key or password in a secure distributed communication network", EU Patent 0 720 796 (filed 20 Sep. 1993). • P. Janson, H. Scherzer, "Data integrity in smart cards", US Patent 6,535,997 (filed 19 Mar. 2003). • P. Janson, A. Nadalin, N. Nagaratnam, "Security context maintenance within a distributed environment", US Patent (filed 2003). • P. Janson, T. Pietraszek, M. Schunter, C. Vanden Berghe, TRACK on Google Scholar “Computer program with meta-data management function”, US Patent (filed 31 Oct. 2005). • P. Janson, “Integrated software development system, method for enforcing input validation, computer arrangement and computer program product”, US Patent (filed 16 Dec. 2005). Publications • P. Janson, "Removing the Dynamic Linker from the Security Kernel of a Computing Utility", MAC-TR 132, Project MAC, Mass. Inst. of Tech., Cambridge, Mass. (June 1974). • P. Janson, "Dynamic Linking and Environment Initialization in a Multi-Domain Process", Proc. 5th ACM Symp. on Oper. Syst., Austin, Texas (Nov.1975), 43-50. • P. Janson, "Using Type Extension to Organize Virtual Memory Mechanisms", LCS-TR 167, Lab. for Comp. Sc., Mass. Inst. of Tech., Cambridge, Mass. (Sept.1976). • P. Janson, "Protection de l'Information dans les Systèmes d'Ordinateurs", Bull. de l'U. Libre de Bruxelles et de l'Union des Anciens Etudiants, no. 24 (Juin 1980), 78-88. • E. Rothauser, P. Janson, H.R.Müller, "Meshed-Star Networks for Local Communication Systems", Local Networks for Computer Communications, Proc. Int'l Workshop on Local-Area Computer Networks, Zurich (Aug. 1980), A. West & P. Janson (eds.), North-Holland, Amsterdam (1981). • P. Janson, "Using Type Extension to Organize Virtual Memory Mechanisms", ACM Op. Syst. Revw., 15 4 (1981), 6-38. • West, P. Janson (eds.), "Local Networks for Computer Communications: Proceedings of the IFIP Working Group 6.4 International Workshop on Local Networks", IBM Research, Zurich, Switzerland, 27-19 Aug. 1980, North-Holland (1981). • W. Bux, F. Closs, P. Janson, K. Kümmerle, H.R. Müller, "A Reliable Token-Ring System for Local-Area Communication", Proc. Nat'l Telecomm. Conf. Vol.1, IEEE, Piscataway, NJ (Nov. 1981), A2.2.1-A2.2.6 • W. Bux, F. Closs, P. Janson, K. Kümmerle, H.R. Müller, E. Rothauser, "A Local-Area Communication Network Based on a Reliable Token-Ring System", Local Computer Networks, Proc. IFIPS Int'l Symp. on Local Computer Networks, Florence, Italy (Apr.1982), edited by P.C. Ravasio, G. Hopkins and N. Naffah, North-Holland, Amsterdam (1982), 69-82. • P. Janson, L. Svobodova and E. Maehle, "Filing and Printing Services on a Local-Area Network", Proc. 8th IEEE Data Comm. Symp., IEEE Computer Society Press, Piscataway, NJ (1983), 211-220. • W. Bux, F. Closs, P. Janson, K. Kümmerle and H.R. Müller, "A Reliable Token-Ring System as Base for a Local Communication Network", Computer Science Series, Vol. 21, edited by V.H. Haase and W.J. Jaburek, Oldenbourg, Wien/Munchen (1983), 127-146. • W. Bux, F. Closs, P. Janson, K. Kümmerle and H.R. Müller, "A Reliable Token-Ring System for Local-Area Communications", Productivité et Informatique: Pour une Entreprise Dynamique, Proc. Conf. du Printemps Convention, Vol. 2, SICOB, Paris, (1983). • W. Bux, F. Closs, P. Janson, K. Kümmerle and H.R. Müller, "A Reliable Token-Ring System for Local-Area Communication", ECA LAN-Seminar RTS 83/1, European Seminar on Local Area Networks, European CAMAC Association, Geel, Belgium (1983), 11-16. • P. Janson and E. Mumprecht, "Addressing and Routing in a Hierarchy of Token-Rings", Ring Technology Local Area Networks, edited by I.N. Dallas and E.B. Spratt, Elsevier, Amsterdam, (1984), 97-109. • B. Meister, P. Janson, L. Svobodova, "File Transfer in Local-Area Networks: A Performance Study", Proc. 5th Int'l Conf. on Distr. Comp. Syst., Cat.No.85CH2149-3, IEEE Comp. Soc. Press, Silver Spring, MD (1985), 338-349. • P. Janson, "Operating Systems Structures and Mechanisms", Academic Press, London (1985), 1-267. • P. Janson, L. Svobodova and E. Maehle, "Filing and Printing Services on a Local-Area Network", Reprint in W. Stallings (ed.), "Local Network Technology" (2nd Edition), IEEE Comp. Soc. Press, Silver Spring, MD (1985), 401-410. • B. W. Meister, P. Janson, L. Svobodova, "Connection-Oriented Versus Connectionless Protocols: A Performance Study", IEEE Trans. Comp. C-34 12 (1985), 1166-1173. • P. Janson and A.A.R. Cockburn, "Adding Transparent Internetworking to a LAN Application Interface", Proc. EFOC/LAN 87, Basel, Switzerland, IGI Europe, Information Gatekeepers, Boston (1987), 287-293. • P. Janson and A.A.R. Cockburn, "Adding Transparent Internetworking to a LAN Application Surface", (Special Issue on Interconnection of Local-Area Networks), IEEE J. Select. Areas in Comm. SAC-5 9 (1987), 1471-1479. • S. Zatti and P. Janson, "Interconnecting Heterogeneous Networks to OSI with a Global Naming Scheme and Gateway Address Mapping", Proc. 1988 Int'l Zurich Seminar on Digital Communications, B. Plattner & P. Gunzburger (eds.), IEEE, Piscataway, NJ (1988), 247-251. • S. Zatti and P. Janson, "Interconnecting OSI and Non-OSI Networks Using an Integrated Directory Service", Computer Networks and ISDN Systems 15 4 (1988), 269-283. • L. Svobodova, P. Janson, E. Mumprecht, "OSI in Heterogeneous Environments", Proc. 2nd Int'l Symp. on Interoperable Information Systems ISIIS'88, Tokyo, Japan (Nov.1988), 25-35. • L. Svobodova, P. Janson, E. Mumprecht, "Heterogeneity and OSI", IEEE J. Select. Areas in Comm. SAC-8 1 (1990), 67-79. • P. Janson, R. Molva, S. Zatti, "Architectural Directions for Opening IBM Networks: The Case of OSI", Proc. IEEE GLOBECOM '91, Phoenix, AZ, IEEE, Piscataway, NJ (Dec.1991), 1722-27. • P. Janson, R. Molva, "Security in Open Networks and Distributed Systems", Comp. Netw. & ISDN Syst. 22 5, North Holland (1991), 323-346. • P. Janson, R. Molva, "Security in Open Networks and Distributed Systems: A State-of-the-Art Tutorial and Survey", Proc. 2nd IEEE Infocom Int'l Symp. on Integr. Netw. Mgmt., Washington, DC (Apr.1991). • R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva and M. Yung, "Systematic Design of Two-Party Authentication Protocols", Proc. CRYPTO 91, Santa Barbara, CA (Aug.1991). • P. Janson, R. Molva, "Taxonomy and Comparative Analysis of Authentication, Key Acquisition, and Sign-on Protocols in Computer Networks and Distributed Systems", Proc. Conf. on New Architectures for Comm., Paris (Oct. 1991). • P. Janson, R. Molva, S. Zatti, "Architectural Directions for Opening IBM Networks: The Case of OSI", IBM Systems J. 31 2 (1992), 313-335. • S. Zatti, P. Janson, "Security and Management Services in Open Networks and Distributed Systems", Proc. Interop'93, Paris (Oct. 1993). • R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva and M. Yung "Systematic Design of a Family of Attack-Resistant Authentication Protocols", IEEE J. Select. Areas in Comm. SAC-11 5 (1993), 679-693. • F. Piessens, B. De Decker and P. Janson, "Interconnecting Domains with Heterogeneous Key Distribution and Authentication Protocols", Proc. IEEE Comp. Soc. Symp. on Research in Security and Privacy, Oakland, CA, IEEE, Los Alamitos, CA (May 1993), 66-79. • S. Zatti, P. Janson, "Security and Management Services in Open Networks and Distributed Systems", Proc. Interop'94, Berlin (Jun.1994). • P. Janson, "KryptoKnight - Sichere Authentifikation Mathematisch Beweisbar", Telematik Spektrum 3 (1994), 87-88. • R. Hauser, P. Janson, R. Molva, G. Tsudik and E. Van Herreweghen, "Robust and Secure Password and Key Change Method", Proc. ESORICS '94, 3rd European Symp. on Research in Computer Security, ed. by D. Gollmann, Springer Verlag, Berlin (Nov.1994), 107-122. Reprinted in J. Comp. Security 4 1 (1996), 97-111. • R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva and M. Yung, "The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution", IEEE/ACM Trans. on Netw. 3 1 (1995), 31-41. • P. Janson and G. Tsudik, "Secure and Minimal Protocols for Authenticated Key Distribution", Comput. Commun. 18 9 (Sept.1995), 645-653 • P. Janson and R. Molva, “Information and Network Security”, Encyclopedia of Telecommunications, Vol. 9, F.E. Froehlich & A. Kent (eds.), Dekker (1995), 201-227. • P. Janson and M. Waidner, "Electronic Payment over Open Networks", Swiss Informatics Society 3 (1995), 10-15. • P. Janson and M. Waidner, "Electronische Zahlungssysteme", Computerworld 21 (May 1996) • P. Janson and M. Waidner, "Electronic Payment Systems", DuD, Datenschutz und Datensicherheit 20 6 (1996), 350-361. • N. Asokan, P. Janson, M. Steiner and M. Waidner, "The State of the Art in Electronic Payment Systems", IEEE Computer 30 9 (1997), 28-35. • P. Janson, "Mehr Sicherheit und Komfort mit Smartcards", Neue Zürcher Zeitung 220 (Sept.1997), B9. • P. Janson, G. Tsudik and M. Yung, "Scalability and Flexbility in Authentication Services: the KryptoKnight Approach", Proc. IEEE INFOCOM '97, Tokyo, Japan (Apr. 1997). • N. Asokan, P. Janson, M. Steiner and M. Waidner, "The State of the Art in Electronic Payment Systems" (in Japanese), Nikei Computer (Mar.1998). • P. Janson, "Kleinstcomputer im Kreditkartenformat", Computerworld 6 (Feb. 1999). • N. Asokan, P. Janson, M. Steiner and M. Waidner, "State of the Art in Electronic Payment Systems", Advances in Computers, Vol. 53, M. Zelkowitz (ed.), Academic Press (2000), 426-449. • P. Enslow Jr, P. Janson, H. Rudin (eds.) Special issue on computer network security Computer Networks, 31 8 (Apr. 1999) Elsevier North-Holland, Inc. New York, NY, USA. • F. Siebenlist, V. Welch, S. Tuecke, I. Foster, N. Nagaratnam, P. Janson, J. Dayka, A. Nadalin, "OGSA security roadmap" OGSA Security WG, Global Grid Forum, 2002. • S. Lightstone, J. Hellerstein, W. Tetzlaff, P. Janson, E. Lassettre, C. Norton, B. Rajaraman, L. Spainhower , "Towards Benchmarking Autonomic Computing Maturity", Proc. IEEE Intl. Conf. on Industrial Informatics, Banff, Alberta (Aug.2003). • B. E. Carpenter, P. A. Janson , "Abstract interdomain security assertions: A basis for extra-grid virtual organizations", IBM Systems Journal 43 4 (Nov.2004), 689-701. • P. A. Janson, E. Rütsche, "Service on demand" (in German), GDI Impuls Business Journal, Winter 2005, 36-41. • P. A. Janson, "Chapitre 12: Sécurité" (in French) in "Découvrir le Numérique" (A. Schiper Ed.), Presses polytechniques et universitaires romandes, EPFL, Lausanne, 275-312.