1. Authentication in distributed systems
2. B. N. Bershad T. E. Anderson E. D. Lazowska and H. M. Levy [July 1990] User-Level Inter-process Communication for Shared-Memory Multiprocessors University of Washington Dept. of Computer Science & Engineering Technical Report 90-05-07 Seattle WA. B. N. Bershad T. E. Anderson E. D. Lazowska and H. M. Levy [July 1990] User-Level Inter-process Communication for Shared-Memory Multiprocessors University of Washington Dept. of Computer Science & Engineering Technical Report 90-05-07 Seattle WA.
3. The desk area network
4. E. J. Koldinger H. M. Levy J. S. Chase and S. J. Eggers [November 1991] The Protection Lookaside Buffer: Efficient Protection for Single Address-Space Computers Dept. of Computer Science and Engineering University of Washington Technical Report 91-11-05 Seattle WA 98195. E. J. Koldinger H. M. Levy J. S. Chase and S. J. Eggers [November 1991] The Protection Lookaside Buffer: Efficient Protection for Single Address-Space Computers Dept. of Computer Science and Engineering University of Washington Technical Report 91-11-05 Seattle WA 98195.
5. R. M. Needham [1989] Naming in "Distributed Systems" S. J. Mullender ed. ACM Press NYC ISBN 0-201-41660-3. R. M. Needham [1989] Naming in "Distributed Systems" S. J. Mullender ed. ACM Press NYC ISBN 0-201-41660-3.