Proofs Methods for Bisimulation Based Information Flow Security