Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach