Proofs Methods for Bisimulation based Information Flow Security