1. Abramson, D. A. “Hardware Management of a Large Virtual Memory”, Proc. 4th Australian Computer Science Conference, 1981, pp. 1–13.
2. Abramson, D. A. and Keedy, J. L. “Implementing a Large Virtual Memory in a Distributed Computing System”, Proc. 18th Hawaii Conference on System Sciences, 1985, pp.515–522.
3. Brössler, P., Henskens, F. A., Keedy, J. L. and Rosenberg, J. “Addressing Objects in a Very Large Distributed System”, Proc. IFIP Conference on Distributed Systems, 1987, pp. 105–116.
4. Brössler, P. and Rosenberg, J. “Transactions in a Segmented Single Level Store Architecture”, Security and Persistence, Proc. International Workshop on Computer Architectures to Support Security and Persistence of Information, Bremen, 1990, pp.319–338.
5. Burrows, M., Abadi, M. and Needham, R. “A Logic of Authentication”, Twelfth ACM Symposium on Operating System Principles, ACM Operating Systems Review, 1989, pp. 1–13.