Brief

Biting the bullet: how to secure access to drylands resources for multiple users