Information Flow Security in Tree-Manipulating Processes