Data Flow Analysis of Secure Information-Flow