Authorization Scheme Evaluation for Permission Traceability in APEX

Authors

  • Lena Harrington, Victor Monroe

Keywords:

Authorization Traceability; Oracle APEX Security; Access Control Enforcement

Abstract

Authorization mechanisms in Oracle APEX are central to ensuring secure access control across pages,
components, and data workflows in enterprise applications. However, the traceability of permission
decisions is often challenged by dynamic session behavior, workflow sequencing, and layered security
logic. This study introduces an evaluation framework for assessing authorization scheme design,
enforcement consistency, and trace reconstruction viability in live APEX applications. The
methodology includes authorization mapping, user journey simulation, PL/SQL logic inspection,
session state analysis, and concurrency-based stress evaluation. Results show that while authorization
rules function consistently in isolated cases, gaps emerge in multi-step navigation and interactive
operations, where state persistence affects permission outcomes. Strong traceability was observed
when data-level and interface-level access controls were explicitly aligned and recalculated
consistently across sessions. The findings highlight the need for intentionally structured authorization
design supported by session-aware enforcement and detailed runtime observability. This approach
strengthens both operational security and compliance audit readiness in APEX environments.

Downloads

Published

2023-10-21

How to Cite

Lena Harrington, Victor Monroe. (2023). Authorization Scheme Evaluation for Permission Traceability in APEX. Journal of Green Energy and Transition to Sustainability, 2(2), 19–24. Retrieved from https://theeducationjournals.com/index.php/JGETS/article/view/314

Issue

Section

Articles