Constructive Security Using Information Flow Control