2013
DOI: 10.1016/j.enpol.2013.06.039
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive method to find RPO trajectory and incentive scheme for promotion of renewable energy in India with study of impact of RPO on tariff

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…The first account of RPO is attributed to a blog post by Gareth Heyes [50], introducing selfreferencing a PHP script with server-side URL rewriting. Furthermore, the post notes that certain versions of Internet Explorer allow JavaScript execution from within a CSS context in the Compatibility View mode [85], escalating style injection to XSS [128].…”
Section: Relative Path Overwritementioning
confidence: 99%
See 3 more Smart Citations
“…The first account of RPO is attributed to a blog post by Gareth Heyes [50], introducing selfreferencing a PHP script with server-side URL rewriting. Furthermore, the post notes that certain versions of Internet Explorer allow JavaScript execution from within a CSS context in the Compatibility View mode [85], escalating style injection to XSS [128].…”
Section: Relative Path Overwritementioning
confidence: 99%
“…This semantic disconnect between web browsers and web servers in interpreting relative paths (path confusion) could be exploited by Relative Path Overwrite (RPO). When an injection vulnerability is present in a page, an attacker could manipulate the URL such that the web page references itself as the stylesheet, which turns a simple text injection vulnerability into a style sink [50]. The general threat model of RPO resembles that of Cross-Site Scripting (XSS).…”
Section: Chapter 1 Introductionmentioning
confidence: 99%
See 2 more Smart Citations