| Carroll, "Implementing Multilevel Security by Violation Privilege," Computers and Security, vol. 7, No. 6, Dec. 1988, pp. 563-573. |
| Groepler et al, "The Virtual MC68010," Mini-Micro Conference Record, Nov. 8-11, 1983, pp. 1-8. |
| "Interactive Work Station with Auxiliary Microprocessor for Storage Protection," IBM Technical Disclosure Bulletin, vol. 29, No. 11, Apr. 1987, 1987, pp. 4976-4982. |
| "Storage Keys Addressed by Logical or Physical Address Bus Under Program Control in IBM System/370," IBM Technical Disclosure Bulletin, vol. 31, No. 6, Nov. 1988, p. 353. |
| "A Survey of Microprocessor Architectures for Memory Management," by B. Furht et al, Computer, Mar. 1987, pp. 48, 63-67. |