Text this: Composing and decomposing systems under security properties