I'm pretty sure there are no papers about this.
I'm also pretty sure that no of the well-known cryptographers (Bernstein, Fergueson, Schneier, ...) will answer here.
However I can provide you an answer that is very likely to be correct.
FIRST: this is a severe abuse of the GCM construction and should be avoided if anyhow possible, use any of the other AES-finalists if you don't trust AES and there's no reason at the moment to do so. Even more you'd need to write your own GCM-implementation or modify an existing one which may be avoided if possible.
Now the answer:
Yes, you can use a streamcipher with slight modifications instead of CTR-Mode.
In this specification you'll find two nice pictures that show how GCM is working. You'll see that there's a counter that will be incremented with every call and then encrypted and used as an XOR-pad. This is basically how any standard stream cipher is used.
Hence using a stream cipher should work if you replace the whole CTR-Mode construction appropiately and should be secure as the stream cipher is used as intended.
The only other issue may be the generation of the H value which is $E_K(0^{128})$. Here you may just use your stream-cipher will a well-defined IV (maybe derived from the normal IV using a hash-function?).