{"id":2,"date":"2024-11-25T14:40:35","date_gmt":"2024-11-25T14:40:35","guid":{"rendered":"http:\/\/t-hueller.de\/?page_id=2"},"modified":"2025-02-12T10:09:35","modified_gmt":"2025-02-12T10:09:35","slug":"research","status":"publish","type":"page","link":"http:\/\/t-hueller.de\/index.php\/research\/","title":{"rendered":"Research"},"content":{"rendered":"\n<p><strong>Publications (co-) authored by me:<\/strong><\/p>\n\n\n\n<p>My first peer-reviewed journal paper:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Towards a Data Flow Diagram-Centric Confidentiality Analysis in Palladio <\/p>\n\n\n\n<p class=\"has-medium-font-size\"><em>In 15th Symposium on Software Performance 2024 (SSP \u201924)<\/em>, 2024<\/p>\n\n\n\n<p class=\"has-medium-font-size\">&#8211; Tom H\u00fcller \n<span class=\"more-authors\" data-authors=\", Felix Schwickerath, Benjamin Arp, Nils Niehues, Nicolas Boltz, Sebastian Hahner\">et al.<\/span><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"https:\/\/dl.gi.de\/items\/7788bcde-4db8-480d-94bd-bfaf9826bcfe\">HTML<\/a>    <a href=\"https:\/\/fb-swt.gi.de\/fileadmin\/FB\/SWT\/Softwaretechnik-Trends\/Verzeichnis\/Band_44_Heft_4\/SSP24_10_camera-ready_3657.pdf\" data-type=\"link\" data-id=\"https:\/\/fb-swt.gi.de\/fileadmin\/FB\/SWT\/Softwaretechnik-Trends\/Verzeichnis\/Band_44_Heft_4\/SSP24_10_camera-ready_3657.pdf\">PDF<\/a><\/p>\n<\/blockquote>\n\n\n\n<p>My bachelor thesis:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\" style=\"padding-top:0;padding-bottom:0\">\n<p>Automated Consistency of Legal and Software Architecture System Specifications for Data Protection Analysis <\/p>\n\n\n\n<p class=\"has-medium-font-size\">&#8211; Tom H\u00fcller<\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"https:\/\/publikationen.bibliothek.kit.edu\/1000178945\">HTML<\/a>    <a href=\"https:\/\/publikationen.bibliothek.kit.edu\/1000178945\/156969210\">PDF<\/a><\/p>\n<\/blockquote>\n\n\n\n<p>Further research:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Integrating Security-Enriched Data Flow Diagrams Into Architecture-Based Confidentiality Analysis <\/p>\n\n\n\n<p class=\"has-medium-font-size\"><em>In 15th Symposium on Software Performance 2024 (SSP \u201924)<\/em>, 2024<\/p>\n\n\n\n<p class=\"has-medium-font-size\">&#8211; Nils Niehues, Benjamin Arp, Tom H\u00fcller <span class=\"more-authors\" data-authors=\", Felix Schwickerath, Nicolas Boltz, Sebastian Hahner\">et al.<\/span><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"https:\/\/dl.gi.de\/items\/52606a6b-0bf4-4bb9-a856-6663e9c69d52\">HTML <\/a>    <a href=\"https:\/\/fb-swt.gi.de\/fileadmin\/FB\/SWT\/Softwaretechnik-Trends\/Verzeichnis\/Band_44_Heft_4\/SSP24_15_camera-ready_9164.pdf\">PDF<\/a><\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Analyzing Cyclic Data Flow Diagrams Regarding Information Security<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><em>In 15th Symposium on Software Performance 2024 (SSP \u201924)<\/em>, 2024<\/p>\n\n\n\n<p class=\"has-medium-font-size\">&#8211; Benjamin Arp, Nils Niehues, Tom H\u00fcller <span class=\"more-authors\" data-authors=\", Felix Schwickerath, Nicolas Boltz, Sebastian Hahner\">et al.<\/span><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"https:\/\/dl.gi.de\/items\/134c5cf7-a462-4e52-bb05-4688eb311222\">HTML<\/a>    <a href=\"https:\/\/fb-swt.gi.de\/fileadmin\/FB\/SWT\/Softwaretechnik-Trends\/Verzeichnis\/Band_44_Heft_4\/SSP24_14_camera-ready_1000.pdf\">PDF<\/a><\/p>\n<\/blockquote>\n\n\n\n<script>\njQuery(document).ready(function ($) {\n    $(\".more-authors\").on(\"click\", function () {\n        var element = $(this);\n\n        \/\/ Retrieve author names and default text\n        var moreAuthorsText = element.attr(\"data-authors\");\n        var defaultText = \"et al.\";\n        var currentText = element.text();\n\n        \/\/ Toggle between default text and author names\n        var newText = currentText === defaultText ? moreAuthorsText : defaultText;\n        element.text(\"\");\n\n        \/\/ Typing effect animation\n        var cursorPosition = 0;\n        var textAdder = setInterval(function () {\n            element.text(newText.substring(0, cursorPosition + 1));\n            if (++cursorPosition == newText.length) {\n                clearInterval(textAdder);\n            }\n        }, 10);\n    });\n});\n<\/script>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Publications (co-) authored by me: My first peer-reviewed journal paper: Towards a Data Flow Diagram-Centric Confidentiality Analysis in Palladio In 15th Symposium on Software Performance 2024 (SSP \u201924), 2024 &#8211; Tom H\u00fcller et al. HTML PDF My bachelor thesis: Automated Consistency of Legal and Software Architecture System Specifications for Data Protection Analysis &#8211; Tom H\u00fcller [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/t-hueller.de\/index.php\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/t-hueller.de\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/t-hueller.de\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/t-hueller.de\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/t-hueller.de\/index.php\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":32,"href":"http:\/\/t-hueller.de\/index.php\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":163,"href":"http:\/\/t-hueller.de\/index.php\/wp-json\/wp\/v2\/pages\/2\/revisions\/163"}],"wp:attachment":[{"href":"http:\/\/t-hueller.de\/index.php\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}